mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
302 lines
10 KiB
JSON
302 lines
10 KiB
JSON
{
|
|
"id": "CVE-2019-18631",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2019-11-05T16:15:10.867",
|
|
"lastModified": "2021-09-13T10:52:51.043",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Windows component of Centrify Authentication and Privilege Elevation Services 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.5.0, 3.5.1 (18.8), 3.5.2 (18.11), and 3.6.0 (19.6) does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows attackers to execute arbitrary code inside the Centrify process via (1) a crafted application that makes a pipe connection to the process and sends malicious serialized data or (2) a crafted Microsoft Management Console snap-in control file."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El componente de Windows de Centrify Authentication and Privilege Elevation Services versiones 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.5.0, 3.5.1 (18.8), 3.5.2 (18.11) y 3.6.0 (19.6 ), no maneja apropiadamente una excepci\u00f3n no especificada durante el uso de ensamblados parcialmente confiables para serializar datos de entrada, lo que permite a atacantes ejecutar c\u00f3digo arbitrario dentro del proceso de Centrify por medio de (1) una aplicaci\u00f3n dise\u00f1ada que hace una conexi\u00f3n de tuber\u00eda hacia el proceso y env\u00eda datos serializados maliciosos o (2) un archivo de control de plugin de Microsoft Management Console especialmente dise\u00f1ado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.1
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-502"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:authentication_service:3.4.0:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "98106861-DA6A-453B-A9B0-EF86F9891998"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:authentication_service:3.4.1:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "2602E2CF-09EA-4CB6-B281-A2EB3D4AEB30"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:authentication_service:3.4.2:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "E0ECE44A-9182-4E94-B0E0-4794552378F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:authentication_service:3.4.3:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "10B0318C-D1A6-43BC-9415-CF7987328AE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:authentication_service:3.5.0:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "750EE1FD-8C8E-49AB-9F20-E8BFBA19CEF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:authentication_service:3.5.1:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "AEF52B4A-1F37-4A0F-827D-24D1A3289CC1"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:centrify:infrastructure_services:18.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D5355A3-35D7-4D6A-B814-E2AD531CB366"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:authentication_service:3.5.2:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "E22B4A30-8A1C-4665-BABB-9F318486B1DE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:centrify:infrastructure_services:18.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A735689-C481-41CD-8CE8-8340E67E0A33"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:authentication_service:3.6.0:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "64377680-7F54-45DA-AC46-2F054BBDFBC3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:centrify:infrastructure_services:19.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "691E416C-079E-4AAD-9709-74E6824000F5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:privilege_elevation_service:3.4.0:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "C11EFD6B-569D-42A7-B12B-D798E488CCD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:privilege_elevation_service:3.4.1:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "E911F9E5-7B9C-4710-A8A3-44167BE3CA01"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:privilege_elevation_service:3.4.2:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "993AFA3C-4461-4C13-AA7E-641826282266"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:privilege_elevation_service:3.4.3:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "55D735BF-F8F9-4A0D-A62E-51697C18C693"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:privilege_elevation_service:3.5.0:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "A57E45C9-8DA5-46ED-ACF8-CFCE0E0E434C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:privilege_elevation_service:3.5.1:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "CDBA4072-1FAF-4323-81AB-8BB2A49C95FD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:centrify:infrastructure_services:18.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D5355A3-35D7-4D6A-B814-E2AD531CB366"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:privilege_elevation_service:3.5.2:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "86DF830C-83E8-4FF7-AA78-7AA85E3A2A2A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:centrify:infrastructure_services:18.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A735689-C481-41CD-8CE8-8340E67E0A33"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:centrify:privilege_elevation_service:3.6.0:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "DED2F13A-54C4-434E-8016-0CF5C223E506"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:centrify:infrastructure_services:19.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "691E416C-079E-4AAD-9709-74E6824000F5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://centrify.force.com/support/Article/KB-22420-Centrify-Agent-for-Windows-Remote-Code-Execution-Vulnerability",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |