René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

132 lines
4.1 KiB
JSON

{
"id": "CVE-2008-1593",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-31T23:44:00.000",
"lastModified": "2017-09-29T01:30:46.910",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The checkpoint and restart feature in the kernel in IBM AIX 5.2, 5.3, and 6.1 does not properly protect kernel memory, which allows local users to read and modify portions of memory and gain privileges via unspecified vectors involving a restart of a 64-bit process, probably related to the as_getadsp64 function."
},
{
"lang": "es",
"value": "La caracter\u00edstica de checkpoint (punto de comprobaci\u00f3n) y restart (reinicio) en el kernel de IBM AIX 5.2, 5.3 y 6.1 no protege adecuadamente la memoria del kernel, lo que permite a usuarios locales leer y modificar porciones de memoria y obtener privilegios a trav\u00e9s de vectores no especificados que implican un reinicio de un proceso de 64 bits, probablemente relacionado con la funci\u00f3n as_getadsp64."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17EECCCB-D7D1-439A-9985-8FAE8B44487B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EA8DDF4A-1C5D-4CB1-95B3-69EAE6572507"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD518B94-9CD7-4C45-8766-578CF427B4CF"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1019606",
"source": "cve@mitre.org"
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ11820",
"source": "cve@mitre.org"
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ12794",
"source": "cve@mitre.org"
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ16992",
"source": "cve@mitre.org"
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ17111",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/28467",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0865",
"source": "cve@mitre.org"
},
{
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153",
"source": "cve@mitre.org"
},
{
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
"source": "cve@mitre.org"
},
{
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4595",
"source": "cve@mitre.org"
}
]
}