BDU:2021-03140

Vulnerability from fstec - Published: 31.08.2016
VLAI Severity ?
Title
Уязвимость алгоритмов шифрования DES и Triple DES, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Description
Уязвимость алгоритмов шифрования DES и Triple DES связана с отсутствием защиты служебных данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к защищаемой информации
Vendor
Oracle Corp., Red Hat Inc., Juniper Networks Inc., Python Software Foundation
Software Name
Enterprise Manager Ops Center, JD Edwards EnterpriseOne Tools, Red Hat Enterprise Linux Server, Business Intelligence Enterprise Edition, HTTP Server, VM VirtualBox, Application Testing Suite, Security Service, Oracle Retail Predictive Application Server, Oracle GoldenGate Application Adapters, Red Hat JBoss Enterprise Web Server, Oracle Real User Experience Insight, Communications Analytics, JunOS, Oracle Linux, Application Server, Oracle Enterprise Session Border Controller, Oracle TimesTen In-Memory Database, Python
Software Version
12.3.3 (Enterprise Manager Ops Center), 9.2 (JD Edwards EnterpriseOne Tools), 6 (Red Hat Enterprise Linux Server), 7 (Red Hat Enterprise Linux Server), 11.1.1.9.0 (Business Intelligence Enterprise Edition), 12.2.1.3.0 (Business Intelligence Enterprise Edition), 12.2.1.3.0 (HTTP Server), до 5.0.28 (VM VirtualBox), до 5.1.8 (VM VirtualBox), 12.4.0 (Enterprise Manager Ops Center), 13.3.0.1 (Application Testing Suite), 11.1.1.9.0 (Security Service), 12.1.3.0.0 (Security Service), 12.2.1.3.0 (Security Service), 11.1.1.9.0 (HTTP Server), 12.1.3.0.0 (HTTP Server), 15.0.3 (Oracle Retail Predictive Application Server), 16.0.3 (Oracle Retail Predictive Application Server), 12.3.2.1.0 (Oracle GoldenGate Application Adapters), 2 (Red Hat JBoss Enterprise Web Server), 3 (Red Hat JBoss Enterprise Web Server), 13.3.1.0 (Oracle Real User Experience Insight), 12.1.1 (Communications Analytics), 5 (Red Hat Enterprise Linux Server), до 12.1X46-D65 (JunOS), до 13.3R10 (JunOS), до 14.1R9 (JunOS), до 14.1X55-D35 (JunOS), до 14.2R8 (JunOS), до 15.1F5-S5 (JunOS), до 15.1R4-S5 (JunOS), до 15.1R5 (JunOS), до 15.1X49-D70 (JunOS), до 16.1R3 (JunOS), 5 (Oracle Linux), 12.1.3 (Application Server), ECZ7.3.0 (Oracle Enterprise Session Border Controller), 11.1.1.7.0 (Business Intelligence Enterprise Edition), 12.2.1.2.0 (Business Intelligence Enterprise Edition), 11.1.1.7.0 (HTTP Server), до 18.1.4.1.0 (Oracle TimesTen In-Memory Database), 13.2.3.1 (Oracle Real User Experience Insight), 13.1.2.1 (Oracle Real User Experience Insight), 3.3 (Python), 3.4.0 (Python), 3.5.0 (Python), 3.6.0 (Python)
Possible Mitigations
Использование рекомендаций: Для JunOS: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11172&cat=SIRT_1&actp=LIST&showDraft=false Для программных продуктов Oracle Corp.: https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpujul2019.html https://www.oracle.com/security-alerts/cpuapr2018.html https://www.oracle.com/security-alerts/cpujan2018.html https://www.oracle.com/security-alerts/cpujul2017.html https://www.oracle.com/security-alerts/cpuoct2016.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2017.html https://www.oracle.com/security-alerts/linuxbulletinoct2016.html https://www.oracle.com/security-alerts/ovmbulletinoct2016.html Для программных продуктов Red Hat Inc.: https://access.redhat.com/security/cve/cve-2016-2183
Reference
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11172&cat=SIRT_1&actp=LIST&showDraft=false https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpujul2019.html https://www.oracle.com/security-alerts/cpuapr2018.html https://www.oracle.com/security-alerts/cpujan2018.html https://www.oracle.com/security-alerts/cpujul2017.html https://www.oracle.com/security-alerts/cpuoct2016.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2017.html https://www.oracle.com/security-alerts/linuxbulletinoct2016.html https://www.oracle.com/security-alerts/ovmbulletinoct2016.html https://access.redhat.com/security/cve/cve-2016-2183
CWE
CWE-200

{
  "CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  "CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp., Red Hat Inc., Juniper Networks Inc., Python Software Foundation",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "12.3.3 (Enterprise Manager Ops Center), 9.2 (JD Edwards EnterpriseOne Tools), 6 (Red Hat Enterprise Linux Server), 7 (Red Hat Enterprise Linux Server), 11.1.1.9.0 (Business Intelligence Enterprise Edition), 12.2.1.3.0 (Business Intelligence Enterprise Edition), 12.2.1.3.0 (HTTP Server), \u0434\u043e 5.0.28 (VM VirtualBox), \u0434\u043e 5.1.8 (VM VirtualBox), 12.4.0 (Enterprise Manager Ops Center), 13.3.0.1 (Application Testing Suite), 11.1.1.9.0 (Security Service), 12.1.3.0.0 (Security Service), 12.2.1.3.0 (Security Service), 11.1.1.9.0 (HTTP Server), 12.1.3.0.0 (HTTP Server), 15.0.3 (Oracle Retail Predictive Application Server), 16.0.3 (Oracle Retail Predictive Application Server), 12.3.2.1.0 (Oracle GoldenGate Application Adapters), 2 (Red Hat JBoss Enterprise Web Server), 3 (Red Hat JBoss Enterprise Web Server), 13.3.1.0 (Oracle Real User Experience Insight), 12.1.1 (Communications Analytics), 5 (Red Hat Enterprise Linux Server), \u0434\u043e 12.1X46-D65 (JunOS), \u0434\u043e 13.3R10 (JunOS), \u0434\u043e 14.1R9 (JunOS), \u0434\u043e 14.1X55-D35 (JunOS), \u0434\u043e 14.2R8 (JunOS), \u0434\u043e 15.1F5-S5 (JunOS), \u0434\u043e 15.1R4-S5 (JunOS), \u0434\u043e 15.1R5 (JunOS), \u0434\u043e 15.1X49-D70 (JunOS), \u0434\u043e 16.1R3 (JunOS), 5 (Oracle Linux), 12.1.3 (Application Server), ECZ7.3.0 (Oracle Enterprise Session Border Controller), 11.1.1.7.0 (Business Intelligence Enterprise Edition), 12.2.1.2.0 (Business Intelligence Enterprise Edition), 11.1.1.7.0 (HTTP Server), \u0434\u043e 18.1.4.1.0 (Oracle TimesTen In-Memory Database), 13.2.3.1 (Oracle Real User Experience Insight), 13.1.2.1 (Oracle Real User Experience Insight), 3.3 (Python), 3.4.0 (Python), 3.5.0 (Python), 3.6.0 (Python)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f JunOS:\nhttps://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11172\u0026cat=SIRT_1\u0026actp=LIST\u0026showDraft=false\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle Corp.:\nhttps://www.oracle.com/security-alerts/cpuapr2020.html\nhttps://www.oracle.com/security-alerts/cpujul2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2020.html\nhttps://www.oracle.com/security-alerts/cpujul2019.html\nhttps://www.oracle.com/security-alerts/cpuapr2018.html\nhttps://www.oracle.com/security-alerts/cpujan2018.html\nhttps://www.oracle.com/security-alerts/cpujul2017.html\nhttps://www.oracle.com/security-alerts/cpuoct2016.html\nhttps://www.oracle.com/security-alerts/cpujan2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2017.html\nhttps://www.oracle.com/security-alerts/linuxbulletinoct2016.html\nhttps://www.oracle.com/security-alerts/ovmbulletinoct2016.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2016-2183",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "31.08.2016",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.06.2021",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.06.2021",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-03140",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2016-2183",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Enterprise Manager Ops Center, JD Edwards EnterpriseOne Tools, Red Hat Enterprise Linux Server, Business Intelligence Enterprise Edition, HTTP Server, VM VirtualBox, Application Testing Suite, Security Service, Oracle Retail Predictive Application Server, Oracle GoldenGate Application Adapters, Red Hat JBoss Enterprise Web Server, Oracle Real User Experience Insight, Communications Analytics, JunOS, Oracle Linux, Application Server, Oracle Enterprise Session Border Controller, Oracle TimesTen In-Memory Database, Python",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux Server 6 , Red Hat Inc. Red Hat Enterprise Linux Server 7 , Red Hat Inc. Red Hat Enterprise Linux Server 5 , Juniper Networks Inc. JunOS \u0434\u043e 12.1X46-D65 , Juniper Networks Inc. JunOS \u0434\u043e 13.3R10 , Juniper Networks Inc. JunOS \u0434\u043e 14.1R9 , Juniper Networks Inc. JunOS \u0434\u043e 14.1X55-D35 , Juniper Networks Inc. JunOS \u0434\u043e 14.2R8 , Juniper Networks Inc. JunOS \u0434\u043e 15.1F5-S5 , Juniper Networks Inc. JunOS \u0434\u043e 15.1R4-S5 , Juniper Networks Inc. JunOS \u0434\u043e 15.1R5 , Juniper Networks Inc. JunOS \u0434\u043e 15.1X49-D70 , Juniper Networks Inc. JunOS \u0434\u043e 16.1R3 , Oracle Corp. Oracle Linux 5 ",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f DES \u0438 Triple DES, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u043b\u0443\u0436\u0435\u0431\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f DES \u0438 Triple DES \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u043b\u0443\u0436\u0435\u0431\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11172\u0026cat=SIRT_1\u0026actp=LIST\u0026showDraft=false\nhttps://www.oracle.com/security-alerts/cpuapr2020.html\nhttps://www.oracle.com/security-alerts/cpujul2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2020.html\nhttps://www.oracle.com/security-alerts/cpujul2019.html\nhttps://www.oracle.com/security-alerts/cpuapr2018.html\nhttps://www.oracle.com/security-alerts/cpujan2018.html\nhttps://www.oracle.com/security-alerts/cpujul2017.html\nhttps://www.oracle.com/security-alerts/cpuoct2016.html\nhttps://www.oracle.com/security-alerts/cpujan2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2017.html\nhttps://www.oracle.com/security-alerts/linuxbulletinoct2016.html\nhttps://www.oracle.com/security-alerts/ovmbulletinoct2016.html\nhttps://access.redhat.com/security/cve/cve-2016-2183",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b, \u0421\u0423\u0411\u0414",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…