2024-12-08 03:06:42 +00:00

117 lines
3.6 KiB
JSON

{
"id": "CVE-2009-3851",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-11-03T16:30:12.593",
"lastModified": "2024-11-21T01:08:19.710",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trusted Extensions in Sun Solaris 10 interferes with the operation of the xscreensaver-demo command for the XScreenSaver application, which makes it easier for physically proximate attackers to access an unattended workstation for which the intended screen locking did not occur, related to the \"restart daemon.\""
},
{
"lang": "es",
"value": "Trusted Extensions en Sun Solaris 10 interfiere con la operaci\u00f3n del comando xscreensaver-demo para la aplicaci\u00f3n XScreenSaver, lo que facilita a atacantes pr\u00f3ximos f\u00edsicamente acceder a una estaci\u00f3n desatendida en la que el bloqueo de pantalla no ha sido efectivo. Relacionado con \"restart daemon (reinicio del demonio)\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 7.2,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*",
"matchCriteriaId": "7BF232A9-9E0A-481E-918D-65FC82EF36D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*",
"matchCriteriaId": "0C0C3793-E011-4915-8F86-CE622A2D37D1"
}
]
}
]
}
],
"references": [
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-28-1",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270809-1",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6845",
"source": "cve@mitre.org"
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-28-1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270809-1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6845",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}