2024-12-08 03:06:42 +00:00

264 lines
8.2 KiB
JSON

{
"id": "CVE-2018-1383",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2018-02-13T20:29:00.437",
"lastModified": "2024-11-21T03:59:43.387",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A software logic bug creates a vulnerability in an AIX 6.1, 7.1, and 7.2 daemon which could allow a user with root privileges on one system, to obtain root access on another machine. IBM X-force ID: 138117."
},
{
"lang": "es",
"value": "Un error de l\u00f3gica de software crea una vulnerabilidad en un demonio AIX, en versiones 6.1, 7.1 y 7.2, que podr\u00eda permitir que un usuario con privilegios root en un sistema obtenga acceso root en otro equipo. IBM X-Force ID: 138117."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD518B94-9CD7-4C45-8766-578CF427B4CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "362CFB2F-817A-4E55-A315-86B6243E3F74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53544921-1C1A-4382-99D7-0F3011BA76DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "15FF1838-81E0-4AFE-8DEE-505CC7692CE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7E63EC63-28AF-4745-BD9E-58B6A3A5FD27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "37738498-F7C1-4CB8-A1DC-E198B4E0781E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "25F1D105-3480-45ED-9D1D-089683C87355"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0C245E4F-3679-4A95-88A9-9FB2CC04F248"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7026CB-5C55-4706-B17B-964A45DFA3B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:6.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "78B18570-2979-4D4F-8B82-DD6BB284B4C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0402E20C-8B41-4A2A-BFF9-92EC843985F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCD291BF-3E5F-420B-B269-B7CE6C5B7A3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE63FAB0-DE3F-4F64-A9A1-1B6190CF7A4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A12F5156-3D40-4D73-B63F-832444914F4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92E71E54-C7C9-4CA9-BF5A-B58253723EB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "48F204DE-2F8F-4854-A127-9CF20F3CEC2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6791504A-A48A-4ED0-94AF-4C8A3B91516F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CDF8469C-36EE-4E48-A5F6-643BC6041502"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE9844B7-5EF9-4CD6-8361-620EBF532197"
}
]
}
]
}
],
"references": [
{
"url": "http://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1026948",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/102989",
"source": "psirt@us.ibm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1040358",
"source": "psirt@us.ibm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138117",
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "http://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1026948",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/102989",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1040358",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138117",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
}
]
}