CVE-2017-4947
CVSS10.0
发布时间 :2018-01-29 11:29:00
修订时间 :2018-02-27 13:38:23
NMS    

[原文]VMware Realize Automation (7.3 and 7.2) and vSphere Integrated Containers (1.x before 1.3) contain a deserialization vulnerability via Xenon. Successful exploitation of this issue may allow remote attackers to execute arbitrary code on the appliance.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-502 [可信数据的反序列化]

- CPE (受影响的平台与产品)

cpe:/a:vmware:vrealize_automation:7.2.0
cpe:/a:vmware:vrealize_automation:7.3.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4947
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4947
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/102852
(VENDOR_ADVISORY)  BID  102852
http://www.securitytracker.com/id/1040289
(VENDOR_ADVISORY)  SECTRACK  1040289
http://www.securitytracker.com/id/1040290
(VENDOR_ADVISORY)  SECTRACK  1040290
https://www.vmware.com/security/advisories/VMSA-2018-0006.html
(VENDOR_ADVISORY)  CONFIRM  https://www.vmware.com/security/advisories/VMSA-2018-0006.html

- 漏洞信息

VMware vRealize Automation and vSphere Integrated Containers Remote Code Execution Vulnerability
Input Validation Error 102852
Yes No
2018-01-26 12:00:00 2018-01-26 12:00:00
The vendor reported this issue.

- 受影响的程序版本

VMWare vSphere Integrated Containers 1.2
VMWare vSphere Integrated Containers 1.1
VMWare vSphere Integrated Containers 1.0
VMWare vRealize Automation 7.2
VMWare vRealize Automation 7.3.0
,VMWare vSphere Integrated Containers 1.3

- 不受影响的程序版本

VMWare vSphere Integrated Containers 1.3

- 漏洞讨论

VMware vRealize Automation and vSphere Integrated Containers are prone to a remote code-execution vulnerability.

Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause a denial-of-service condition.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站