mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
119 lines
3.6 KiB
JSON
119 lines
3.6 KiB
JSON
{
|
|
"id": "CVE-2011-0995",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-05-13T17:05:41.893",
|
|
"lastModified": "2017-08-17T01:33:46.353",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La gema sqlite3-ruby en el paquete rubygem-sqlite3 antes de v1.2.4-0.5.1 en SUSE Linux Enterprise (SLE) v11 SP1 utiliza permisos d\u00e9biles para archivos no especificados, lo que permite a usuarios locales conseguir privilegios a trav\u00e9s de vectores desconocidos."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:rubyforge:rubygem-sqlite3:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.2.3",
|
|
"matchCriteriaId": "02C0AB3C-8690-4843-A88C-72E8569A55A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:rubyforge:rubygem-sqlite3:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "964CF47D-048F-4DEA-BBF8-A018B6C27111"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:rubyforge:rubygem-sqlite3:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E52A448-096A-4E18-BDC1-D85DF55CCE84"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:rubyforge:rubygem-sqlite3:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01C3D515-76B9-4A86-84F1-832A562CEE7E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:novell:suse_linux_enterprise:11:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1B8EB92-4ADC-4E2B-990F-331C6D491FE7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://support.novell.com/security/cve/CVE-2011-0995.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/47694",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.novell.com/show_bug.cgi?id=685928",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67263",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |