BDU:2019-00323
Vulnerability from fstec - Published: 05.06.2018
VLAI Severity ?
Title
Уязвимость метода RsaKeyPairGenerator::getNumberOfIterations() библиотеки Bouncy Castle, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным
Description
Уязвимость метода RsaKeyPairGenerator::getNumberOfIterations() библиотеки Bouncy Castle связана с недостатками использования криптографических ключей. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к защищаемым данным с использованием сетевых протоколов (HTTP, HTTPS)
Severity ?
Vendor
Oracle Corp., Сообщество свободного программного обеспечения, Novell Inc., Legion of the Bouncy Castle Inc., Red Hat Inc., Siemens AG
Software Name
API Gateway, Debian GNU/Linux, OpenSUSE Leap, Enterprise Repository, Business Process Management Suite, WebLogic Server, PeopleSoft Enterprise PeopleTools, Bouncy Castle, WebCenter Portal, Managed File Transfer, Red Hat Virtualization, Enterprise Manager Base Platform, Retail Xstore Point of Service, Oracle Utilities Network Management System, Communications Converged Application Server, Communications WebRTC Session Controller, Communications Application Session Controller, Business Transaction Management, SOA Suite, Red Hat Enterprise Linux, Red Hat Satellite, Oracle Data Integrator, Jboss Fuse, OpenShift Application Runtimes, Red Hat JBoss Fuse, Enterprise Manager for Fusion Middleware, Red Hat Single Sign-On, Red Hat JBoss EAP, Banking Platform, Communications Diameter Signaling Router, Bouncy Castle FIPS Java API (BC-FJA), Oracle Retail Convenience and Fuel POS Software, Oracle Communications Convergence, JBoss Enterprise Application Platform
Software Version
11.1.2.4.0 (API Gateway), 9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), 12.1.3.0.0 (Enterprise Repository), 11.1.1.9.0 (Business Process Management Suite), 12.1.3.0.0 (Business Process Management Suite), 12.2.1.3.0 (Business Process Management Suite), 12.2.1.3 (WebLogic Server), 8.55 (PeopleSoft Enterprise PeopleTools), 8.56 (PeopleSoft Enterprise PeopleTools), 8.57 (PeopleSoft Enterprise PeopleTools), до 1.54 включительно (Bouncy Castle), 12.1.3.0.0 (WebCenter Portal), 12.2.1.3.0 (Managed File Transfer), 11.1.1.9.0 (WebCenter Portal), 12.2.1.3.0 (WebCenter Portal), 4 (Red Hat Virtualization), 13.2.0.0.0 (Enterprise Manager Base Platform), 13.3.0.0.0 (Enterprise Manager Base Platform), 7.0 (Retail Xstore Point of Service), 12.1.3.0.0 (Managed File Transfer), 12.1.0.5.0 (Enterprise Manager Base Platform), 1.12.0.3 (Oracle Utilities Network Management System), до 7.0.0.1 (Communications Converged Application Server), до 7.2 (Communications WebRTC Session Controller), 3.7.1 (Communications Application Session Controller), 3.8.0 (Communications Application Session Controller), 12.1.0 (Business Transaction Management), 12.1.3.0.0 (SOA Suite), 12.2.1.3.0 (SOA Suite), 8 (Red Hat Enterprise Linux), 8 (Debian GNU/Linux), 6.0 (Red Hat Satellite), 12.2.1.3.0 (Oracle Data Integrator), 7 (Jboss Fuse), 7.1 (Retail Xstore Point of Service), 1.0 (OpenShift Application Runtimes), 6 (Red Hat JBoss Fuse), 13.2.0.0 (Enterprise Manager for Fusion Middleware), 13.3.0.0 (Enterprise Manager for Fusion Middleware), 7.2 (Red Hat Single Sign-On), 7.1 (Red Hat JBoss EAP), 2.6.0 (Banking Platform), 2.6.1 (Banking Platform), 2.6.2 (Banking Platform), 8.0.0 (Communications Diameter Signaling Router), 8.1.0 (Communications Diameter Signaling Router), 8.2.0 (Communications Diameter Signaling Router), 8.2.1 (Communications Diameter Signaling Router), от 1.54 до 1.59 включительно (Bouncy Castle), от 1.0 до 1.0.1 включительно (Bouncy Castle FIPS Java API (BC-FJA)), 2.8.1 (Oracle Retail Convenience and Fuel POS Software), 2.3.0.0 (Oracle Utilities Network Management System), 2.3.0.1 (Oracle Utilities Network Management System), 2.3.0.2 (Oracle Utilities Network Management System), 3.0.2 (Oracle Communications Convergence), 7.1 for RHEL 6 (JBoss Enterprise Application Platform), 7.1 for RHEL 7 (JBoss Enterprise Application Platform)
Possible Mitigations
Использование рекомендаций:
https://www.bouncycastle.org/jira/browse/BJA-694
Для OpenSUSE:
https://www.suse.com/security/cve/CVE-2018-1000180/
Для Oracle:
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Для Debian GNU/Linux:
https://www.debian.org/security/2018/dsa-4233
https://www.debian.org/security/2018/dsa-4233
Для продуктов Red Hat:
https://access.redhat.com/security/cve/CVE-2018-1000180
Reference
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.suse.com/security/cve/CVE-2018-1000180/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.debian.org/security/2018/dsa-4233
https://access.redhat.com/security/cve/CVE-2018-1000180
CWE
CWE-310
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc., Legion of the Bouncy Castle Inc., Red Hat Inc., Siemens AG",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "11.1.2.4.0 (API Gateway), 9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), 12.1.3.0.0 (Enterprise Repository), 11.1.1.9.0 (Business Process Management Suite), 12.1.3.0.0 (Business Process Management Suite), 12.2.1.3.0 (Business Process Management Suite), 12.2.1.3 (WebLogic Server), 8.55 (PeopleSoft Enterprise PeopleTools), 8.56 (PeopleSoft Enterprise PeopleTools), 8.57 (PeopleSoft Enterprise PeopleTools), \u0434\u043e 1.54 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Bouncy Castle), 12.1.3.0.0 (WebCenter Portal), 12.2.1.3.0 (Managed File Transfer), 11.1.1.9.0 (WebCenter Portal), 12.2.1.3.0 (WebCenter Portal), 4 (Red Hat Virtualization), 13.2.0.0.0 (Enterprise Manager Base Platform), 13.3.0.0.0 (Enterprise Manager Base Platform), 7.0 (Retail Xstore Point of Service), 12.1.3.0.0 (Managed File Transfer), 12.1.0.5.0 (Enterprise Manager Base Platform), 1.12.0.3 (Oracle Utilities Network Management System), \u0434\u043e 7.0.0.1 (Communications Converged Application Server), \u0434\u043e 7.2 (Communications WebRTC Session Controller), 3.7.1 (Communications Application Session Controller), 3.8.0 (Communications Application Session Controller), 12.1.0 (Business Transaction Management), 12.1.3.0.0 (SOA Suite), 12.2.1.3.0 (SOA Suite), 8 (Red Hat Enterprise Linux), 8 (Debian GNU/Linux), 6.0 (Red Hat Satellite), 12.2.1.3.0 (Oracle Data Integrator), 7 (Jboss Fuse), 7.1 (Retail Xstore Point of Service), 1.0 (OpenShift Application Runtimes), 6 (Red Hat JBoss Fuse), 13.2.0.0 (Enterprise Manager for Fusion Middleware), 13.3.0.0 (Enterprise Manager for Fusion Middleware), 7.2 (Red Hat Single Sign-On), 7.1 (Red Hat JBoss EAP), 2.6.0 (Banking Platform), 2.6.1 (Banking Platform), 2.6.2 (Banking Platform), 8.0.0 (Communications Diameter Signaling Router), 8.1.0 (Communications Diameter Signaling Router), 8.2.0 (Communications Diameter Signaling Router), 8.2.1 (Communications Diameter Signaling Router), \u043e\u0442 1.54 \u0434\u043e 1.59 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Bouncy Castle), \u043e\u0442 1.0 \u0434\u043e 1.0.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Bouncy Castle FIPS Java API (BC-FJA)), 2.8.1 (Oracle Retail Convenience and Fuel POS Software), 2.3.0.0 (Oracle Utilities Network Management System), 2.3.0.1 (Oracle Utilities Network Management System), 2.3.0.2 (Oracle Utilities Network Management System), 3.0.2 (Oracle Communications Convergence), 7.1 for RHEL 6 (JBoss Enterprise Application Platform), 7.1 for RHEL 7 (JBoss Enterprise Application Platform)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.bouncycastle.org/jira/browse/BJA-694 \n\n\u0414\u043b\u044f OpenSUSE:\nhttps://www.suse.com/security/cve/CVE-2018-1000180/\n\n\u0414\u043b\u044f Oracle:\nhttps://www.oracle.com/security-alerts/cpuapr2020.html\nhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\nhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\nhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\nhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html \nhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://www.debian.org/security/2018/dsa-4233\nhttps://www.debian.org/security/2018/dsa-4233 \n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat:\nhttps://access.redhat.com/security/cve/CVE-2018-1000180",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.06.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.01.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-00323",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-1000180",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "API Gateway, Debian GNU/Linux, OpenSUSE Leap, Enterprise Repository, Business Process Management Suite, WebLogic Server, PeopleSoft Enterprise PeopleTools, Bouncy Castle, WebCenter Portal, Managed File Transfer, Red Hat Virtualization, Enterprise Manager Base Platform, Retail Xstore Point of Service, Oracle Utilities Network Management System, Communications Converged Application Server, Communications WebRTC Session Controller, Communications Application Session Controller, Business Transaction Management, SOA Suite, Red Hat Enterprise Linux, Red Hat Satellite, Oracle Data Integrator, Jboss Fuse, OpenShift Application Runtimes, Red Hat JBoss Fuse, Enterprise Manager for Fusion Middleware, Red Hat Single Sign-On, Red Hat JBoss EAP, Banking Platform, Communications Diameter Signaling Router, Bouncy Castle FIPS Java API (BC-FJA), Oracle Retail Convenience and Fuel POS Software, Oracle Communications Convergence, JBoss Enterprise Application Platform",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Novell Inc. OpenSUSE Leap 42.3 , Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0442\u043e\u0434\u0430 RsaKeyPairGenerator::getNumberOfIterations() \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Bouncy Castle, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0438 (CWE-310)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0442\u043e\u0434\u0430 RsaKeyPairGenerator::getNumberOfIterations() \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Bouncy Castle \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043a\u043b\u044e\u0447\u0435\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 (HTTP, HTTPS)",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\nhttps://www.suse.com/security/cve/CVE-2018-1000180/\nhttps://www.oracle.com/security-alerts/cpuapr2020.html\nhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\nhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\nhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\nhttps://www.debian.org/security/2018/dsa-4233\nhttps://access.redhat.com/security/cve/CVE-2018-1000180",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-310",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…