Show plain JSON{"id": "CVE-2019-11461", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.4, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 1.1}]}, "published": "2019-04-22T21:29:00.477", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00088.html", "source": "cve@mitre.org"}, {"url": "https://gitlab.gnome.org/GNOME/nautilus/issues/987", "tags": ["Issue Tracking", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://security.gentoo.org/glsa/201908-27", "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00088.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://gitlab.gnome.org/GNOME/nautilus/issues/987", "tags": ["Issue Tracking", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://security.gentoo.org/glsa/201908-27", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in GNOME Nautilus 3.30 prior to 3.30.6 and 3.32 prior to 3.32.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal, allowing an attacker to escape the sandbox if the thumbnailer has a controlling terminal. This is due to improper filtering of the TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063."}, {"lang": "es", "value": "Fue encontrado un problema en GNOME Nautilus versi\u00f3n 3.30 anterior a 3.30.6 y versi\u00f3n 3.32 anterior a 3.32.1. Unas thumbnailer comprometidas pueden escapar del bubblewrap sandbox que se utiliza para confinar miniaturas usando el ioctl de TIOCSTI para introducir caracteres en el b\u00fafer de entrada del terminal de control de thumbnailer, lo que permite que un atacante escape del sandbox si el thumbnailer tiene un terminal de control. Esto se debe a un filtrado incorrecto del ioctl TIOCSTI en sistemas de 64 bits, similar a CVE-2019-10063."}], "lastModified": "2024-11-21T04:21:07.653", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:gnome:nautilus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAE01FE8-B164-4261-BD21-DE3DA4BDD32C", "versionEndExcluding": "3.30.6", "versionStartIncluding": "3.30"}, {"criteria": "cpe:2.3:a:gnome:nautilus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A845FA5-6311-4CFD-9BD2-A8FF073689A5", "versionEndExcluding": "3.32.1", "versionStartIncluding": "3.32"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}