mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
64 lines
3.1 KiB
JSON
64 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2024-1618",
|
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
|
"published": "2024-03-12T15:15:48.260",
|
|
"lastModified": "2024-11-21T08:50:56.193",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A search path or unquoted item vulnerability in Faronics Deep Freeze Server Standard, which affects versions 8.30.020.4627 and earlier. This vulnerability affects the DFServ.exe file.\u00a0An attacker with local user privileges could exploit this vulnerability to replace the legitimate DFServ.exe service executable with a malicious file of the same name and located in a directory that has a higher priority than the legitimate directory.\u00a0Thus, when the service starts, it will run the malicious file instead of the legitimate executable, allowing the attacker to execute arbitrary code, gain unauthorized access to the compromised system or stop the service from running."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una ruta de b\u00fasqueda o vulnerabilidad de elemento sin comillas en Faronics Deep Freeze Server Standard, que afecta a las versiones 8.30.020.4627 y anteriores. Esta vulnerabilidad afecta al archivo DFServ.exe. Un atacante con privilegios de usuario local podr\u00eda aprovechar esta vulnerabilidad para reemplazar el ejecutable del servicio DFServ.exe leg\u00edtimo con un archivo malicioso con el mismo nombre y ubicado en un directorio que tenga mayor prioridad que el directorio leg\u00edtimo. Por lo tanto, cuando se inicia el servicio, ejecutar\u00e1 el archivo malicioso en lugar del ejecutable leg\u00edtimo, lo que permitir\u00e1 al atacante ejecutar c\u00f3digo arbitrario, obtener acceso no autorizado al sistema comprometido o detener la ejecuci\u00f3n del servicio."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cve-coordination@incibe.es",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cve-coordination@incibe.es",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-428"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/unquoted-item-or-search-path-vulnerability-faronics-deep-freeze-server",
|
|
"source": "cve-coordination@incibe.es"
|
|
},
|
|
{
|
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/unquoted-item-or-search-path-vulnerability-faronics-deep-freeze-server",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |