fkie_cve-2017-7199
Vulnerability from fkie_nvd
Published
2017-03-23 16:59
Modified
2024-11-21 03:31
Summary
Nessus 6.6.2 - 6.10.3 contains a flaw related to insecure permissions that may allow a local attacker to escalate privileges when the software is running in Agent Mode. Version 6.10.4 fixes this issue.
Impacted products
Vendor Product Version
tenable nessus 6.6.2
tenable nessus 6.7
tenable nessus 6.8.0
tenable nessus 6.8.1
tenable nessus 6.9.0
tenable nessus 6.9.1
tenable nessus 6.9.2
tenable nessus 6.9.3
tenable nessus 6.10.0
tenable nessus 6.10.1
tenable nessus 6.10.2
tenable nessus 6.10.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E04EEA5-6FE6-425F-9CA5-8BD6917B5C52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B7B5202-3EF9-4082-A3BE-E81856651773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "344995CB-4E95-42AE-B909-A4148148E40B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63616621-2753-4095-B1E6-71289422D099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F128AEB9-6D5F-47C8-B119-7D8061C6F8BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "250F614B-0BFB-4DBA-B78C-E3DA99DE0240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "523F2759-5610-4F03-BA8D-60C20D9FB57B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1975C695-0C1C-4585-BEE9-234E0C2BF9F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C14B7B-DE1F-4751-A681-B051CC55163E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE8AFD34-B980-49A8-AD6B-F92DBD695102",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A284F5-758D-4040-9920-9DD72122A4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tenable:nessus:6.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "395C69E7-A926-40F1-B546-0436BAEF48B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nessus 6.6.2 - 6.10.3 contains a flaw related to insecure permissions that may allow a local attacker to escalate privileges when the software is running in Agent Mode. Version 6.10.4 fixes this issue."
    },
    {
      "lang": "es",
      "value": "Nessus 6.6.2 - 6.10.3 contiene un fallo relacionado con permisos inseguros que pueden permitir a un atacante local remoto aumentar privilegios cuando el software se est\u00e1 ejecutando en Agent Mode. Version 6.10.4 soluciona este problema."
    }
  ],
  "id": "CVE-2017-7199",
  "lastModified": "2024-11-21T03:31:21.267",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-23T16:59:00.777",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97110"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1038124"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://aspe1337.blogspot.nl/2017/04/writeup-of-cve-2017-7199.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tenable.com/security/tns-2017-08"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://aspe1337.blogspot.nl/2017/04/writeup-of-cve-2017-7199.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tenable.com/security/tns-2017-08"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.