René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.7 KiB
JSON

{
"id": "CVE-2019-1010066",
"sourceIdentifier": "josh@bress.net",
"published": "2019-07-18T14:15:11.407",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Lawrence Livermore National Laboratory msr-safe v1.1.0 is affected by: Incorrect Access Control. The impact is: An attacker could modify model specific registers. The component is: ioctl handling. The attack vector is: An attacker could exploit a bug in ioctl interface whitelist checking, in order to write to model specific registers, normally a function reserved for the root user. The fixed version is: v1.2.0."
},
{
"lang": "es",
"value": "El laboratorio nacional Lawrence Livermore msr-safe v1.1.0 se ve afectado por: Control de acceso incorrecto. El impacto es: Un atacante podr\u00eda modificar registros espec\u00edficos del modelo. El componente es: manejo de ioctl. El vector de ataque es: Un atacante podr\u00eda explotar un error en la comprobaci\u00f3n de la lista blanca de la interfaz ioctl, para escribir en registros espec\u00edficos del modelo, normalmente una funci\u00f3n reservada para el usuario ra\u00edz. La versi\u00f3n fija es: v1.2.0."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:llnl:model_specific_registers-safe:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E302830C-15C6-4FCD-BFAA-F86C4BB92B05"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/LLNL/msr-safe/compare/v1.1.0...v1.2.0",
"source": "josh@bress.net",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://www.tldp.org/LDP/lkmpg/2.4/html/x856.html",
"source": "josh@bress.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}