2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2007-3338" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Multiple stack-based buffer overflows in Ingres database server 2006 9.0.4, r3, 2.6, and 2.5, as used in multiple CA (Computer Associates) products, allow remote attackers to execute arbitrary code via the (1) uuid_from_char or (2) duve_get_args functions."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "20070625 Ingres stack overflow in uuid_from_char function" ,
"refsource" : "BUGTRAQ" ,
2018-10-16 11:17:01 -04:00
"url" : "http://www.securityfocus.com/archive/1/472197/100/0/threaded"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20070625 Ingres verifydb local stack overflow" ,
"refsource" : "BUGTRAQ" ,
2018-10-16 11:17:01 -04:00
"url" : "http://www.securityfocus.com/archive/1/472194/100/0/threaded"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-ingres-stack-overflow/" ,
"refsource" : "MISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-ingres-stack-overflow/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-ingres-stack-overflow/" ,
"refsource" : "MISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-ingres-stack-overflow/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "24585" ,
"refsource" : "BID" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/24585"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "37483" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://osvdb.org/37483"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2007-2288" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2007/2288"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2007-2290" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2007/2290"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "25775" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/25775"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "25756" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/25756"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ingres-duvegetargs-bo(34998)" ,
"refsource" : "XF" ,
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34998"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ingres-uuidfromchar-bo(34995)" ,
"refsource" : "XF" ,
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34995"
}
]
}
}