mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
84 lines
2.9 KiB
JSON
84 lines
2.9 KiB
JSON
{
|
|
"id": "CVE-2011-5158",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2012-09-07T10:32:24.087",
|
|
"lastModified": "2018-05-23T16:46:14.173",
|
|
"vulnStatus": "Analyzed",
|
|
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple untrusted search path vulnerabilities in the DMTGUI2.EXE and DvInesLogFileViewer.Exe components in DATEV Grundpaket Basis CD23.20 allow local users to gain privileges via a Trojan horse (1) DVBSKNLANG101.dll or (2) DvZediTermSrvInfo004.dll file in the current working directory, as demonstrated by a directory that contains a .dmt, .adl, .c02, .dof, or .jrf file. NOTE: some of these details are obtained from third party information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de ruta de b\u00fasqueda no confiable en los componentes DMTGUI2.EXE y DvInesLogFileViewer.Exe en DATEV Grundpaket Basis CD23.20, permite a usuarios locales ganar privilegios a trav\u00e9s de un archivo (1) DVBSKNLANG101.dll or (2) DvZediTermSrvInfo004.dll caballo de troya que se encuentre en el mismo directorio de trabajo, como se demostr\u00f3 con un directorio que contiene un archivo .dmt, .adl, .c02, .dof, o .jrf. NOTA: algunos de estos detalles han sido obtenidos de fuentes de terceros."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-426"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:datev:grundpaket_basis:cd23.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "77A55FD1-15E6-4513-8FC8-F8642A878E5D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sotiriu.de/adv/NSOADV-2010-010.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |