Vulnerabilites related to SUSE - libzypp
cve-2017-7436
Vulnerability from cvelistv5
Published
2018-03-01 19:00
Modified
2024-09-16 19:09
Severity ?
EPSS score ?
Summary
In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
References
▼ | URL | Tags |
---|---|---|
https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.suse.com/show_bug.cgi?id=1038984 | x_refsource_CONFIRM | |
https://www.suse.com/de-de/security/cve/CVE-2017-7436/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1038984" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libzypp", "vendor": "SUSE", "versions": [ { "lessThan": "20170803", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Boleslaw Tokarski" } ], "datePublic": "2017-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Missing UI interaction when using unsigned packages could lead to use of malicious packages.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:43", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1038984" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/" } ], "source": { "advisory": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html", "defect": [ "https://bugzilla.suse.com/1038984" ], "discovery": "INTERNAL" }, "title": "libzypp accepts unsigned packages even when configured to check signatures", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-08-03T00:00:00.000Z", "ID": "CVE-2017-7436", "STATE": "PUBLIC", "TITLE": "libzypp accepts unsigned packages even when configured to check signatures" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libzypp", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "20170803" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Boleslaw Tokarski" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing UI interaction when using unsigned packages could lead to use of malicious packages." } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2017:2040", "refsource": "SUSE", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1038984", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1038984" }, { "name": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/", "refsource": "CONFIRM", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/" } ] }, "source": { "advisory": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html", "defect": [ "https://bugzilla.suse.com/1038984" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-7436", "datePublished": "2018-03-01T19:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-09-16T19:09:24.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-9269
Vulnerability from cvelistv5
Published
2018-03-01 19:00
Modified
2024-09-17 00:36
Severity ?
EPSS score ?
Summary
In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.
References
▼ | URL | Tags |
---|---|---|
https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.suse.com/show_bug.cgi?id=1045735 | x_refsource_CONFIRM | |
https://www.suse.com/de-de/security/cve/CVE-2017-9269/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:02:43.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1045735" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libzypp", "vendor": "SUSE", "versions": [ { "lessThan": "201808", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Moritz Duge and Till Doerges from PRESENSE" } ], "datePublic": "2017-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious mirrors could downgrade repositories from trusted signed repositories to unsigned malicious repositories.", "lang": "en", "type": "text" } ] }, { "descriptions": [ { "cweId": "CWE-757", "description": "CWE-757", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:46", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1045735" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" } ], "source": { "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1045735" ], "discovery": "EXTERNAL" }, "title": "lack of keypinning in libzypp could lead to repository switching", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-08-03T00:00:00.000Z", "ID": "CVE-2017-9269", "STATE": "PUBLIC", "TITLE": "lack of keypinning in libzypp could lead to repository switching" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libzypp", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "201808" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Moritz Duge and Till Doerges from PRESENSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious mirrors could downgrade repositories from trusted signed repositories to unsigned malicious repositories." } ] }, { "description": [ { "lang": "eng", "value": "CWE-757" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2017:2040", "refsource": "SUSE", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1045735", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1045735" }, { "name": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/", "refsource": "CONFIRM", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" } ] }, "source": { "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1045735" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-9269", "datePublished": "2018-03-01T19:00:00Z", "dateReserved": "2017-05-29T00:00:00", "dateUpdated": "2024-09-17T00:36:56.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7435
Vulnerability from cvelistv5
Published
2018-03-01 19:00
Modified
2024-09-16 22:14
Severity ?
EPSS score ?
Summary
In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
References
▼ | URL | Tags |
---|---|---|
https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html | vendor-advisory, x_refsource_SUSE | |
https://www.suse.com/de-de/security/cve/CVE-2017-7435/ | x_refsource_CONFIRM | |
https://bugzilla.suse.com/show_bug.cgi?id=1009127 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libzypp", "vendor": "SUSE", "versions": [ { "lessThan": "20170803", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ludwig Nussel of SUSE" } ], "datePublic": "2017-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Missing UI interaction when adding untrusted repositories could lead to use of unsigned package repositories.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:16:05", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127" } ], "source": { "advisory": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html", "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1009127" ], "discovery": "INTERNAL" }, "title": "libzypp accepts unsigned 3rd party repo without warning", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-08-03T00:00:00.000Z", "ID": "CVE-2017-7435", "STATE": "PUBLIC", "TITLE": "libzypp accepts unsigned 3rd party repo without warning" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libzypp", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "20170803" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Ludwig Nussel of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing UI interaction when adding untrusted repositories could lead to use of unsigned package repositories." } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2017:2040", "refsource": "SUSE", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "name": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/", "refsource": "CONFIRM", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1009127", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127" } ] }, "source": { "advisory": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html", "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1009127" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-7435", "datePublished": "2018-03-01T19:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-09-16T22:14:57.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7685
Vulnerability from cvelistv5
Published
2018-08-31 15:00
Modified
2024-09-17 00:52
Severity ?
EPSS score ?
Summary
The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1091624 | x_refsource_CONFIRM | |
https://www.suse.com/de-de/security/cve/CVE-2018-7685/ | x_refsource_MISC | |
http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:05.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1091624" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libzypp", "vendor": "SUSE", "versions": [ { "lessThan": "17.5.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:16:08", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1091624" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" } ], "source": { "defect": [ "1091624" ], "discovery": "EXTERNAL" }, "title": "libzypp does not reevaluate malicious rpms once downloaded", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-08-30T00:00:00.000Z", "ID": "CVE-2018-7685", "STATE": "PUBLIC", "TITLE": "libzypp does not reevaluate malicious rpms once downloaded" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libzypp", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "17.5.0" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1091624", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1091624" }, { "name": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/", "refsource": "MISC", "url": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/" }, { "name": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html", "refsource": "MISC", "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" } ] }, "source": { "defect": [ "1091624" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2018-7685", "datePublished": "2018-08-31T15:00:00Z", "dateReserved": "2018-03-05T00:00:00", "dateUpdated": "2024-09-17T00:52:15.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }