cvelist/2013/2xxx/CVE-2013-2056.json

72 lines
2.1 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 04:24:46 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2056",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 04:24:46 +00:00
"lang": "eng",
"value": "The Inter-Satellite Sync (ISS) operation in Red Hat Network (RHN) Satellite 5.3, 5.4, and 5.5 does not properly check client \"authenticity,\" which allows remote attackers to obtain channel content by skipping the initial authentication call."
2017-10-16 12:31:07 -04:00
}
2019-03-18 04:24:46 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0848",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0848.html"
},
{
"name": "93566",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/93566"
},
{
"name": "53487",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53487"
}
]
}
}