2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2006-6772" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "20061225 w3m format string bug" ,
"refsource" : "FULLDISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051457.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://sourceforge.net/tracker/index.php?func=detail&aid=1612792&group_id=39518&atid=425439" ,
"refsource" : "MISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://sourceforge.net/tracker/index.php?func=detail&aid=1612792&group_id=39518&atid=425439"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://w3m.cvs.sourceforge.net/*checkout*/w3m/w3m/NEWS?revision=1.79" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://w3m.cvs.sourceforge.net/*checkout*/w3m/w3m/NEWS?revision=1.79"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?r1=1.249&r2=1.250" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?r1=1.249&r2=1.250"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?view=log" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?view=log"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2007-077" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://fedoranews.org/cms/node/2415"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2007-078" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://fedoranews.org/cms/node/2416"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "GLSA-200701-06" ,
"refsource" : "GENTOO" ,
2017-10-16 12:31:07 -04:00
"url" : "http://security.gentoo.org/glsa/glsa-200701-06.xml"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "OpenPKG-SA-2006.44" ,
"refsource" : "OPENPKG" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.044.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "SUSE-SA:2007:005" ,
"refsource" : "SUSE" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.novell.com/linux/security/advisories/2007_05_w3m.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-399-1" ,
"refsource" : "UBUNTU" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/usn-399-1"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21735" ,
"refsource" : "BID" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/21735"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "24332" ,
"refsource" : "BID" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/24332"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2006-5164" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2006/5164"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "1017440" ,
"refsource" : "SECTRACK" ,
2017-10-16 12:31:07 -04:00
"url" : "http://securitytracker.com/id?1017440"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "23492" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/23492"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "23588" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/23588"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "23717" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/23717"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "23773" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/23773"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "23792" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/23792"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "w3m-certificate-format-string(31114)" ,
"refsource" : "XF" ,
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31114"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "w3m-inputanswer-format-string(34821)" ,
"refsource" : "XF" ,
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34821"
}
]
}
}