mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
410 lines
15 KiB
JSON
410 lines
15 KiB
JSON
{
|
|
"id": "CVE-2015-7944",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2017-08-18T17:29:01.170",
|
|
"lastModified": "2021-09-08T17:07:29.173",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The RESTful control interface (aka RAPI or ganeti-rapi) in Ganeti before 2.9.7, 2.10.x before 2.10.8, 2.11.x before 2.11.8, 2.12.x before 2.12.6, 2.13.x before 2.13.3, 2.14.x before 2.14.2, and 2.15.x before 2.15.2, when used in SSL mode, allows remote attackers to cause a denial of service (resource consumption) via SSL parameter renegotiation."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La interfaz de control RESTful (tambi\u00e9n conocida como RAPI o ganeti-rapi) en Ganeti en versiones anteriores a la 2.9.7, 2.10.x en versiones anteriores a la 2.10.8, 2.11.x en versiones anteriores a la 2.11.8, 2.12.x en versiones anteriores a la 2.12.6, 2.13.x en versiones anteriores a la 2.13.3, 2.14.x en versiones anteriores a la 2.14.2, y 2.15.x en versiones anteriores a la 2.15.2, cuando se emplea en modo SSL, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (consumo de recursos) mediante la renegociaci\u00f3n de par\u00e1metros SSL."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.9.6",
|
|
"matchCriteriaId": "2AFB2A29-9615-40BE-A9D2-5ED10CAD25F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F66B137A-661B-4A33-B42D-36086C5CE25F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD3870AD-723B-4EE6-B86F-759126E06F21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A8CBB01-AA66-4262-A3DF-26DED8E1B243"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F6F8F9E-2942-45A9-A3DF-7A2B3392110C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4946A0E-7FAF-49D1-85B7-5CE8A31B9F3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C0A6331-D11E-4062-8883-3B0A8661CE20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74F1C8B8-9A50-45E5-8CCA-425199DEB994"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1136452D-0A89-4E27-B6FA-F08236885FFF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "22D6DAB2-3455-4532-8FC9-FB04DD71B9B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F038EE62-9261-4D28-BC3C-8692FCA87115"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35ECC2AA-C63F-4794-A62D-B78ED6F82DD5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "27853A40-4920-4EAD-B7D7-94F21984F0F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "773D755E-7E1E-460E-A753-9AB5AA67759E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4B85FCE9-38B9-437D-AA42-A5C258A1D785"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4806E38C-C58B-4C41-A2BB-D6ABB2A392C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB162407-8069-43A6-8F93-492E6EBF17C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "997067C6-82FC-4917-A16C-3E8D7F1DFC77"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15071497-2E59-4EA1-ACDC-5D6AC2703226"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9FA19307-8A03-4161-9A15-BA8C7FD83F3B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9A1261E-DC4D-49DA-9667-738D7B50C4AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53A21A0F-1087-4C50-A9BE-1401C6D2E353"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5AC8EDA6-66FA-4B10-93BD-75DBB1936890"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF9320F7-7814-4C8D-8B0D-E3C561F241AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA3195D4-3F38-4233-93BD-9C7B0BD81DEF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E1CA193-AB44-4FE1-89EB-F44B4BAE5E8C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52293A00-F1A4-4855-B9D3-231CC3F44F14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A613785D-35E9-4D04-AA53-ECE74D19416D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DA3E104-B4F1-4D1F-96EC-3920AA3D947B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94BE58DA-8FEB-469A-9357-336EEA5E4C69"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4814E6BD-E537-4ED5-9E2D-C6C93967B481"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E7081B6-E36F-460D-BD6A-A58190046671"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91E4AA14-555D-46F1-BFC6-1E7DC241B146"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79DF3293-D53E-4BA0-AB1D-1F60DDEE4657"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43DC4920-7456-40C3-8DB3-0131FA8B1E62"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26181A20-ACF6-4EB4-869D-6B26B7C41783"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF9B2609-E1A3-4835-9F10-A36D377597F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9ED4BD26-FCF7-4D80-A303-A265C8C0E5C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F1246E6-E244-4F8A-AB57-2463BDD83549"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:beta2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3009D3B0-1890-4F9D-8B43-29CD245EBCCE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEB2AE3B-D220-40CA-8945-0D8B17152D39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "913E97F4-4D88-445D-B0D4-6915F0744793"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "344982DF-20A4-4DB7-A3B7-ACC8A0BEAE32"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B36F975B-6F6A-43AE-9588-A844A340C0F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2F9BF24-60B1-4334-9082-8F1F251B381A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1A19969-A0E2-4FFB-A4AC-AC330F3C89F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "480C9B88-DC61-4586-B714-69751FC233C5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://docs.ganeti.org/ganeti/2.10/html/news.html#version-2-10-8",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://docs.ganeti.org/ganeti/2.11/html/news.html#version-2-11-8",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://docs.ganeti.org/ganeti/2.12/html/news.html#version-2-12.6",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://docs.ganeti.org/ganeti/2.13/html/news.html#version-2-13-3",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://docs.ganeti.org/ganeti/2.14/html/news.html#version-2-14-2",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://docs.ganeti.org/ganeti/2.15/html/news.html#version-2-15-2",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://docs.ganeti.org/ganeti/2.9/html/news.html#version-2-9-7",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2016/dsa-3431",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.ocert.org/advisories/ocert-2015-012.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/39169/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |