mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
165 lines
5.6 KiB
JSON
165 lines
5.6 KiB
JSON
{
|
|
"id": "CVE-2014-3602",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2014-11-13T21:32:00.187",
|
|
"lastModified": "2023-02-13T00:40:59.020",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Red Hat OpenShift Enterprise before 2.2 allows local users to obtain IP address and port number information for remote systems by reading /proc/net/tcp."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Red Hat OpenShift Enterprise anterior a 2.2 permite a usuarios locales obtener direcciones IP y otra informaci\u00f3n para sistemas remotos mediante la lectura de /proc/net/tcp."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*",
|
|
"versionEndIncluding": "2.1.8",
|
|
"matchCriteriaId": "B6B266CF-DDC0-421D-A36D-F123241E69B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B497EBB1-17A4-4FE8-B9FF-B2B53B18C175"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "7405F776-4F1C-467A-AC66-5AABBE43411B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "437AB2B0-0175-4E48-A1A5-6723C97F3253"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "BA5E9EB2-607B-43A7-A75F-CA171529B9E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "582D97B4-ADBC-485D-B00F-AD9F3566F711"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "AB204392-8CE0-4B3B-9399-F6B83EB9006F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "7D84F1EB-5654-4B52-92E3-5DA10F97CA39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "AC659BB6-CD01-4F4A-BFBC-227A52ECB391"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "A463CF4B-2010-4AB5-9275-020BF53B5FA8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "C6C0F050-48C7-4AFB-9DB3-A60C7E3501C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "459F1262-B8B0-475E-A7F2-0913FEE6F715"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "732EE887-EB12-492F-A4E4-3F441BB92C8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "34ACA7BA-8DB2-4645-9FF1-DB88195FFD2C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "A87A0BC7-F7D0-4090-992A-C26942FD82DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "81360600-BF69-4078-A6E6-EE6606391924"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1796.html",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1906.html",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |