Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://www.armis.com/blueborne", "name": "https://www.armis.com/blueborne", "tags": ["Exploit", "Technical Description", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://access.redhat.com/security/vulnerabilities/blueborne", "name": "https://access.redhat.com/security/vulnerabilities/blueborne", "tags": ["Not Applicable"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/100814", "name": "100814", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "https://www.kb.cert.org/vuls/id/240311", "name": "VU#240311", "tags": ["Third Party Advisory", "US Government Resource"], "refsource": "CERT-VN"}, {"url": "https://access.redhat.com/security/cve/CVE-2017-1000250", "name": "https://access.redhat.com/security/cve/CVE-2017-1000250", "tags": ["Issue Tracking", "Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.debian.org/security/2017/dsa-3972", "name": "DSA-3972", "tags": [], "refsource": "DEBIAN"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2685", "name": "RHSA-2017:2685", "tags": [], "refsource": "REDHAT"}, {"url": "https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne", "name": "https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne", "tags": [], "refsource": "CONFIRM"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-200"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2017-1000250", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "LOW", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 6.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 6.5, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}}, "publishedDate": "2017-09-12T17:29Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "5.46"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-02-17T02:29Z"}