René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

114 lines
3.2 KiB
JSON

{
"id": "CVE-2021-33505",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-07-15T11:15:07.900",
"lastModified": "2021-07-28T14:04:51.713",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A local malicious user can circumvent the Falco detection engine through 0.28.1 by running a program that alters arguments of system calls being executed. Issue is fixed in Falco versions >= 0.29.1."
},
{
"lang": "es",
"value": "Un usuario malicioso local puede burlar el motor de detecci\u00f3n de Falco a trav\u00e9s de la versi\u00f3n 0.28.1 ejecutando un programa que altera los argumentos de las llamadas al sistema que se est\u00e1n ejecutando. El problema se ha solucionado en las versiones de Falco posteriores e iguales a la versi\u00f3n 0.29.1"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:falco:falco:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.28.1",
"matchCriteriaId": "75E49180-4BE5-4AA2-9699-8871EA2D8260"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/falcosecurity/falco/pull/1675",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/falcosecurity/falco/releases",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
]
}
]
}