mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
179 lines
6.0 KiB
JSON
179 lines
6.0 KiB
JSON
{
|
|
"id": "CVE-2017-0498",
|
|
"sourceIdentifier": "security@android.com",
|
|
"published": "2017-03-08T01:59:02.047",
|
|
"lastModified": "2024-11-21T03:03:06.840",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A denial of service vulnerability in Setup Wizard could allow a local attacker to require Google account sign-in after a factory reset. This issue is rated as Moderate because it may require a factory reset to repair the device. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-30352311."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad de denegaci\u00f3n de servicio en Setup Wizard podr\u00eda permitir a un atacante requerir inicio de sesi\u00f3n en la cuenta de Google tras un reestablecimiento de f\u00e1brica. Este problema est\u00e1 calificado como Moderate porque puede requerir un reestablecimiento de f\u00e1brica para reparar el dispositivo. Producto: Android. Versiones: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. ID de Android: A-30352311."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 5.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 2.1,
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C4E6353-B77A-464F-B7DE-932704003B33"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "77125688-2CCA-4990-ABB2-551D47CB0CDD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9915371-C730-41F7-B86E-7E4DE0DF5385"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7A8EC00-266C-409B-AD43-18E8DFCD6FE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B846C63A-7261-481E-B4A4-0D8C79E0D8A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1D94CDD-DE7B-444E-A3AE-AE9C9A779374"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "691FA41B-C2CE-413F-ABB1-0B22CB322807"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC30B2A2-9674-4052-B402-20348E50F9E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/96793",
|
|
"source": "security@android.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1037968",
|
|
"source": "security@android.com"
|
|
},
|
|
{
|
|
"url": "https://source.android.com/security/bulletin/2017-03-01",
|
|
"source": "security@android.com"
|
|
},
|
|
{
|
|
"url": "https://source.android.com/security/bulletin/2017-03-01.html",
|
|
"source": "nvd@nist.gov",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/96793",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1037968",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://source.android.com/security/bulletin/2017-03-01",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |