René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

131 lines
4.1 KiB
JSON

{
"id": "CVE-2008-4212",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-10-10T10:30:05.137",
"lastModified": "2017-08-08T01:32:30.890",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in rlogind in the rlogin component in Mac OS X 10.4.11 and 10.5.5 applies hosts.equiv entries to root despite what is stated in documentation, which might allow remote attackers to bypass intended access restrictions."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en rlogind en el componente rlogin en Mac OS X v10.4.11 v10.5.5 aplica entradas hosts.equiv a root a pesar de que en la documentaci\u00f3n se indica que podr\u00eda permitir a atacantes remotos evitar las restricciones de acceso establecidas."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Not vulnerable. This issue did not affect the versions of rsh-server packages as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.\n\nThe glibcs ruserok function is used to check users authorization against rhosts files. That implementation of ruserok never opens /etc/hosts.equiv for superuser.",
"lastModified": "2008-10-25T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-16"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1EBF04-C440-4A6B-93F2-DC3A812728C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C147E866-B80F-4FFA-BBE8-19E84A46DB1C"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://support.apple.com/kb/HT3216",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/31681",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/31708",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1021028",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2780",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45785",
"source": "cve@mitre.org"
}
]
}