René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

108 lines
3.5 KiB
JSON

{
"id": "CVE-2021-42977",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-07T20:15:07.493",
"lastModified": "2021-12-08T16:34:05.610",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NoMachine Enterprise Desktop is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet."
},
{
"lang": "es",
"value": "NoMachine Enterprise Desktop est\u00e1 afectado por un desbordamiento de enteros. IOCTL Handler 0x22001B en NoMachine Enterprise Desktop versiones posteriores de 4.0.346 y anteriores a 7.7.4, permite a atacantes locales ejecutar c\u00f3digo arbitrario en modo kernel o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y bloqueo del Sistema Operativo) por medio de un paquete de petici\u00f3n de E/S especialmente dise\u00f1ado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nomachine:enterprise_desktop:*:*:*:*:*:*:*:*",
"versionStartExcluding": "4.0.346",
"versionEndExcluding": "7.7.4",
"matchCriteriaId": "D9ABAFE6-1C7A-4FD9-9BAD-49189463AD91"
}
]
}
]
}
],
"references": [
{
"url": "https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
}
]
}