René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.3 KiB
JSON

{
"id": "CVE-2021-44852",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-01T06:15:07.453",
"lastModified": "2022-01-12T15:23:25.843",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000."
},
{
"lang": "es",
"value": "Se ha detectado un problema en el archivo BS_RCIO64.sys en Biostar RACING GT Evo versi\u00f3n 2.1.1905.1700. Un proceso de baja integridad puede abrir el objeto de dispositivo del controlador y emitir IOCTL para leer o escribir en ubicaciones de memoria f\u00edsica arbitrarias (o llamar a una direcci\u00f3n arbitraria), conllevando a una ejecuci\u00f3n de c\u00f3digo arbitrario. Esto est\u00e1 asociado con 0x226040, 0x226044 y 0x226000.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:biostar:racing_gt_evo:2.1.1905.1700:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E29A0F-B18E-4EDD-AC6A-85C41F30883C"
}
]
}
]
}
],
"references": [
{
"url": "https://nephosec.com/biostar-exploit/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}