Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:sterling_connect:3.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0121DC25-B8D3-409F-B894-40CFB0C0DA42", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:sterling_connect:3.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C57B819A-1D04-458E-87A2-0398A63FAB58", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:sterling_connect:3.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BBBB486E-5869-48F9-B9CE-733F9E167E19", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:sterling_connect:3.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F92AD602-408F-433E-BE57-31A21313ACA5", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:sterling_connect:3.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "15EE5C7B-A3DB-43DB-B2EE-4600C92A01D2", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "IBM Sterling Connect:Direct for OpenVMS 3.4.00, 3.4.01, 3.5.00, 3.6.0, and 3.6.0.1 allow remote attackers to have unspecified impact by leveraging failure to reject client requests for an unencrypted session when used as the server in a TCP/IP session and configured for SSL encryption with the client. IBM X-Force ID: 86138."}, {"lang": "es", "value": "IBM Sterling Connect:Direct for OpenVMS 3.4.00, 3.4.01, 3.5.00, 3.6.0 y 3.6.0.1 permite que atacantes remotos provoquen un impacto sin especificar aprovechando el error a la hora de rechazar peticiones de clientes para una sesi\u00f3n sin cifrar cuando se emplean como servidor en una sesi\u00f3n TCP/IP y se configuran para el cifrado SSL con el cliente. IBM X-Force ID: 86138."}], "id": "CVE-2013-4035", "lastModified": "2024-11-21T01:54:45.630", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 5.1, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 2.1, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-05-01T18:29:00.243", "references": [{"source": "psirt@us.ibm.com", "tags": ["VDB Entry", "Vendor Advisory"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86138"}, {"source": "psirt@us.ibm.com", "tags": ["Vendor Advisory"], "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sterling-connectdirect-for-openvms-unencrypted-data-transfers-can-occur-even-when-ssl-encryption-is-specified-in-the-security-configuration-cve-2013-4035/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["VDB Entry", "Vendor Advisory"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86138"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sterling-connectdirect-for-openvms-unencrypted-data-transfers-can-occur-even-when-ssl-encryption-is-specified-in-the-security-configuration-cve-2013-4035/"}], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-310"}], "source": "nvd@nist.gov", "type": "Primary"}]}