2017-10-16 12:31:07 -04:00
{
2019-03-18 07:03:18 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2016-2057" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-18 07:03:18 +00:00
"lang" : "eng" ,
"value" : "lib/xymond_ipc.c in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 use weak permissions (666) for an unspecified IPC message queue, which allows local users to inject arbitrary messages by writing to that queue."
2017-10-16 12:31:07 -04:00
}
2019-03-18 07:03:18 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "20160214 Xymon: Critical security issues in all versions prior to 4.3.25" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://www.securityfocus.com/archive/1/537522/100/0/threaded"
} ,
{
"name" : "https://sourceforge.net/p/xymon/code/7891/" ,
"refsource" : "CONFIRM" ,
"url" : "https://sourceforge.net/p/xymon/code/7891/"
} ,
{
"name" : "DSA-3495" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2016/dsa-3495"
} ,
{
"name" : "http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html" ,
"refsource" : "MISC" ,
"url" : "http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html"
}
]
}
}