2024-12-08 03:06:42 +00:00

136 lines
4.6 KiB
JSON

{
"id": "CVE-2013-5148",
"sourceIdentifier": "product-security@apple.com",
"published": "2013-10-24T10:53:09.757",
"lastModified": "2024-11-21T01:57:06.450",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apple Keynote before 6.0 does not properly handle the interaction between Keynote presentation mode and the Screen Lock implementation, which allows physically proximate attackers to obtain access by visiting an unattended workstation on which this mode was enabled during a sleep operation."
},
{
"lang": "es",
"value": "Keynote de Apple antes de 6.0 no controla correctamente la interacci\u00f3n entre el modo de presentaci\u00f3n de Keynote y la aplicaci\u00f3n de bloqueo de pantalla, lo que permite a atacantes f\u00edsicamente pr\u00f3ximos a obtener acceso al visitar una estaci\u00f3n de trabajo sin vigilancia en la que se habilit\u00f3 este modo durante una operaci\u00f3n de suspensi\u00f3n (sleep)"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 7.2,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.3",
"matchCriteriaId": "56C9DC7F-C3BD-4FEC-97B5-78A177736383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07AFC578-7183-4294-8C0E-70599C0F8FF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52EDDB82-B777-4E78-9321-F92C897D0810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70935342-A63B-4223-B284-4D5DE4DF0B44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "39D057E6-9646-41F6-812B-5280E5217F21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "69D77B40-72E4-4692-B399-D09AFE313BFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "97D55207-84DF-4272-A4A8-3BD13F784DE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "00F0F7AE-A63B-407B-A5A3-F93CE76BC883"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7DCEE633-4977-45C6-84A5-9986AFC62BB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:keynote:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "12B37865-FCE8-41E4-B91F-3C6B39512867"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00005.html",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00005.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}