cvelist/2006/5xxx/CVE-2006-5461.json

132 lines
4.3 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 22:04:27 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-5461",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-17 22:04:27 +00:00
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22932",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22932"
},
{
"name": "23042",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23042"
},
{
"name": "SUSE-SR:2006:026",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html"
},
{
"name": "22852",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22852"
},
{
"name": "USN-380-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/380-1/"
},
{
"name": "ADV-2006-4474",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4474"
},
{
"name": "23020",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23020"
},
{
"name": "22807",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22807"
},
{
"name": "http://avahi.org/milestone/Avahi%200.6.15",
"refsource": "CONFIRM",
"url": "http://avahi.org/milestone/Avahi%200.6.15"
},
{
"name": "1017257",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017257"
},
{
"name": "[avahi-tickets] 20061106 [Avahi] #69: Avahi needs to check the originating process of netlink messages",
"refsource": "MLIST",
"url": "https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html"
},
{
"name": "MDKSA-2006:215",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:215"
},
{
"name": "avahi-netlink-security-bypass(30207)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30207"
},
{
"name": "GLSA-200611-13",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml"
},
{
"name": "21016",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21016"
}
]
}
}