2024-12-08 03:06:42 +00:00

116 lines
3.3 KiB
JSON

{
"id": "CVE-2017-17469",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-12-08T07:29:00.323",
"lastModified": "2024-11-21T03:17:59.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TG Soft Vir.IT eXplorer Lite 8.5.42 allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact via a \\\\.\\Viragtlt DeviceIoControl request of 0x82730008, a different vulnerability than CVE-2017-16948."
},
{
"lang": "es",
"value": "TG Soft Vir.IT eXplorer Lite 8.5.42 permite que usuarios locales provoquen una denegaci\u00f3n de servicio (BSOD) o, posiblemente, otro impacto sin especificar mediante una petici\u00f3n DeviceIoControl \\\\.\\Viragtlt de 0x82730008. Esta vulnerabilidad es diferente de CVE-2017-16948."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"baseScore": 6.1,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 8.5,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tgsoft:vir.it_explorer:8.5.42:*:*:*:lite:*:*:*",
"matchCriteriaId": "53E0DB63-5253-4F1B-AF09-C41059932E1D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730008",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/0x82730008",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}