Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:symantec:backup_exec_system_recovery:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "26C55BD3-FB64-42B4-9592-387D3B2807D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:symantec:backup_exec_system_recovery:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "094615A2-E362-4944-BD12-7F048B4B824D", "vulnerable": true}, {"criteria": "cpe:2.3:a:symantec:backup_exec_system_recovery:2010:*:*:*:*:*:*:*", "matchCriteriaId": "7B1C9194-DB47-430B-A0FA-1E5233305D9C", "vulnerable": true}, {"criteria": "cpe:2.3:a:symantec:norton_360:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "773EC02D-BAE6-4E24-BC28-8A55394B5AB2", "vulnerable": true}, {"criteria": "cpe:2.3:a:symantec:norton_ghost:*:*:*:*:*:*:*:*", "matchCriteriaId": "47893F2E-06CD-4C8F-87D0-BECAEF97D3F3", "versionEndIncluding": "15.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:symantec:system_recovery_2011:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "635790E9-3511-4215-9F24-F7C736B5DB24", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "GEAR Software CD DVD Filter driver (aka GEARAspiWDM.sys), as used in Symantec Backup Exec System Recovery 8.5 and BESR 2010, Symantec System Recovery 2011, Norton 360, and Norton Ghost, allows local users to cause a denial of service (system crash) via unspecified vectors."}, {"lang": "es", "value": "GEAR Software CD DVD Filter driver (tambi\u00e9n conocido como GEARAspiWDM.sys), tal y como se usa en Symantec Backup Exec System Recovery 8.5 y BESR 2010, Symantec System Recovery 2011, Norton 360 y Norton Ghost, permite que los usuarios locales provoquen una denegaci\u00f3n de servicio (cierre inesperado del sistema) mediante vectores no especificados."}], "id": "CVE-2011-3477", "lastModified": "2024-11-21T01:30:33.283", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-02-19T19:29:00.267", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/47822"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20111109_00"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/47822"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20111109_00"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}