René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

118 lines
3.8 KiB
JSON

{
"id": "CVE-2003-0998",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-01-05T05:00:00.000",
"lastModified": "2021-04-13T20:13:26.040",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unknown \"potential system security vulnerability\" in Computer Associates (CA) Unicenter Remote Control 5.0 through 5.2, and ControlIT 5.0 and 5.1, may allow attackers to gain privileges to the local system account."
},
{
"lang": "es",
"value": "\"vulnerabilidad potencial de seguridad de sistema\" desconocida en Computer Associates (CA) Unicenter Remote Control 5.0 a 5.2, y ControlIT 5.0 y 5.1 puede permitir a atacantes ganar privilegios de la cuenta de sistema local."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B43CE892-50CB-429F-B986-6FD4398A1D71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53C2C33D-8403-4C75-8A52-713393FE408F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:unicenter_remote_control_option:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97E875A6-C08A-44D3-B018-C444CB587EE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:unicenter_remote_control_option:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7466B723-0D4F-47E8-8FAA-6FEABAC2C539"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:controlit:5.0:*:advanced:*:*:*:*:*",
"matchCriteriaId": "35509F76-AAA6-4E8F-9DBC-9A3169BE6B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:controlit:5.0:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "BB927AD3-4266-4853-A9C2-997BD27BA86E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:controlit:5.1:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "B5DFD65B-6A4B-4435-B96E-7679DB42AFD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ca:unicenter_remote_control_option:5.1:*:*:de:*:*:*:*",
"matchCriteriaId": "48FD622F-9F6D-4181-B201-8D7C76F57885"
}
]
}
]
}
],
"references": [
{
"url": "http://support.ca.com/techbases/rp/urc5x-secnote.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}