2024-12-08 03:06:42 +00:00

159 lines
4.3 KiB
JSON

{
"id": "CVE-2017-8087",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-10-22T16:15:10.283",
"lastModified": "2024-11-21T03:33:18.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors."
},
{
"lang": "es",
"value": "El Filtrado de informaci\u00f3n en PPPoE Packet Padding en AVM Fritz! Box 7490 con versiones de firmware Fritz!OS 6.80 y 6.83, permite a los atacantes f\u00edsicamente cercanos visualizar segmentos de paquetes previamente transmitidos o porciones de memoria por medio de vectores no especificados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 2.1,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:avm:fritz\\!os:6.80:*:*:*:*:*:*:*",
"matchCriteriaId": "EB1B8964-82AC-491C-8AE0-BD8A6AC7FE6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:avm:fritz\\!os:6.83:*:*:*:*:*:*:*",
"matchCriteriaId": "38DD26CD-518C-4FCE-B7E4-2F200C357DCE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:avm:fritz\\!box_7490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "409B1299-4F29-45EC-B93B-2EB0001125C4"
}
]
}
]
}
],
"references": [
{
"url": "http://avm.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://fritzbox.com",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://seclists.org/fulldisclosure/2019/Oct/36",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://avm.com",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://fritzbox.com",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "http://seclists.org/fulldisclosure/2019/Oct/36",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}