cvelist/2005/2xxx/CVE-2005-2150.json

97 lines
3.2 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 03:42:47 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2150",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 03:42:47 +00:00
"lang": "eng",
"value": "Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote attackers to (1) list Windows services via svcctl or (2) read eventlogs via eventlog."
2017-10-16 12:31:07 -04:00
}
2019-03-18 03:42:47 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hsc.fr/ressources/presentations/null_sessions/",
"refsource": "MISC",
"url": "http://www.hsc.fr/ressources/presentations/null_sessions/"
},
{
"name": "20050707 NULL sessions vulnerabilities using alternate named pipes",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112076409813099&w=2"
},
{
"name": "1014417",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014417"
},
{
"name": "14177",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14177"
},
{
"name": "win-name-pipe-null-information-disclosure(21286)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21286"
},
{
"name": "14178",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14178"
},
{
"name": "win-pipe-null-eventlog-information-disclosure(21288)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21288"
},
{
"name": "14189",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14189"
}
]
}
}