mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
117 lines
4.0 KiB
JSON
117 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2015-1761",
|
|
"sourceIdentifier": "secure@microsoft.com",
|
|
"published": "2015-07-14T23:59:00.067",
|
|
"lastModified": "2018-10-12T22:09:09.357",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka \"SQL Server Elevation of Privilege Vulnerability.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Microsoft SQL Server 2008 SP3 y SP4, 2008 R2 SP2 y SP3, 2012 SP1 y SP2, y 2014 utilizan una clase incorrecta durante el cambio de tipo de punteros sin especificar, lo que permite a usuarios autenticados remotamente la escalada de privilegios gracias al aprovechamiento ciertos derechos de escritura, tambi\u00e9n conocida como \u201cVulnerabilidad de Escalada de Privilegios en SQL Server.\u201d"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.5
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-284"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CDC7BAB6-6166-41A2-9D86-CE31645261AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:sql_server:2008:r2_sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "591E0A15-4D5F-443A-8197-8D67D57A71C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:sql_server:2008:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BFC56295-63BF-4EA7-99B5-0B8D019C1432"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:sql_server:2008:sp4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "744B637F-AB15-417B-B8AC-10F463CAEF47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:sql_server:2012:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EC9CFCE8-E597-4F1F-AB5A-98E8810238CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:sql_server:2012:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9875CF37-3CFC-4F21-A7A0-EF7B3E99A2EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:microsoft:sql_server:2014:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4A6BA8E-0874-4174-8F3F-7419B448AFCB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1032893",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058",
|
|
"source": "secure@microsoft.com"
|
|
},
|
|
{
|
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05382740",
|
|
"source": "secure@microsoft.com"
|
|
}
|
|
]
|
|
} |