mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-12 02:04:49 +00:00
108 lines
3.4 KiB
JSON
108 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2009-0682",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-08-19T17:30:00.890",
|
|
"lastModified": "2018-10-10T19:30:18.670",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "vetmonnt.sys in CA Internet Security Suite r3, vetmonnt.sys before 9.0.0.184 in Internet Security Suite r4, and vetmonnt.sys before 10.0.0.217 in Internet Security Suite r5 do not properly verify IOCTL calls, which allows local users to cause a denial of service (system crash) via a crafted call."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "vetmonnt.sys en CA Internet Security Suite r3, vetmonnt.sys anteriores a v9.0.0.184 en Internet Security Suite r4, y vetmonnt.sys anteriores a v10.0.0.217 en Internet Security Suite r5 no verifica adecuadamente las llamadas IOCTL, lo que permite a usuarios locales producir una denegaci\u00f3n de servicio ( ca\u00edda de sistema) a trav\u00e9s de una llamada manipulada."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:internet_security_suite:*:r3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9C3A838-C3FC-4134-89E3-3AE13078A359"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:internet_security_suite:9.0.0.184:r4:32bit:*:*:*:*:*",
|
|
"matchCriteriaId": "80B3EC69-F6F6-45E1-80BB-038C1D9C5FA6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:internet_security_suite:10.0.0.217:r5:32bit:*:*:*:*:*",
|
|
"matchCriteriaId": "E391D3E0-FEBF-4634-BB89-7AFCC04415E9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://en.securitylab.ru/lab/PT-2009-05",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/57228",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/505880/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/506103/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214673",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |