René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

147 lines
4.7 KiB
JSON

{
"id": "CVE-2021-28580",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-08T14:15:08.407",
"lastModified": "2021-09-14T15:14:12.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Medium by Adobe version 2.4.5.331 (and earlier) is affected by a buffer overflow vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Medium de Adobe versi\u00f3n 2.4.5.331 (y anteriores), est\u00e1 afectado por una vulnerabilidad de desbordamiento de b\u00fafer cuando se analiza un archivo dise\u00f1ado. Un atacante no autenticado podr\u00eda aprovechar esta vulnerabilidad para lograr una ejecuci\u00f3n de c\u00f3digo remota en el contexto del usuario actual. Es requerida una interacci\u00f3n del usuario para explotar este problema, ya que la v\u00edctima debe abrir un archivo malicioso"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:medium:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.4.5.331",
"matchCriteriaId": "DF562FB7-9920-43FF-A7E1-70C3E4C5536E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:oculus:rift:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A9FAAF2-9441-484A-B22C-958FF349AD7C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:oculus:rift_s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C928DF55-819A-43BE-9FBC-9B562FAA6D63"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:oculus:touch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F397516D-249B-464F-8C16-B21E1CB4008C"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/medium/apsb21-34.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}