mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 03:02:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4b3cfe2c06
commit
c5324cc5f6
@ -1,40 +1,17 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-1232",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method."
|
||||
"value": "CVE-2008-1232 tomcat: Cross-Site-Scripting enabled by sendError call"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,338 +21,569 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "JBEAP 4.2.0 for RHEL 4",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:2.0.0-5.CP07.0jpp.ep1.1.el4",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "JBEAP 4.2.0 for RHEL 5",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:2.0.0-5.CP07.0jpp.ep1.1.el5",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Certificate System 7.3",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:1.6.5-1jpp_1rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:1.2-2jpp_4rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:1.2.1-1jpp_3rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:1.0-2jpp_6rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:1.1.1-2jpp_8rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:1.0-0.M4.1jpp_10rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:2.0-3jpp_2rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:1.2.12-1jpp_1rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "1:3.0.1-1jpp_4rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:1.3.3-3.el4",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:7.3.0-20.el4",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:7.3.0-10.el4",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:7.3.0-14.el4",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:7.3.0-19.el4",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:7.3.0-6.el4",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:7.3.0-13.el4",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:5.5.23-0jpp_4rh.16",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:2.7.1-1jpp_1rh",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:1.3.02-2jpp_1rh",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Developer Suite V.3",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:5.5.23-0jpp_12rh",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 5",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:5.5.23-0jpp.7.el5_2.1",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat JBoss Enterprise Application Platform 4.3 for RHEL 4",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:2.0.0-5.CP07.0jpp.ep1.1.el4",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat JBoss Enterprise Application Platform 4.3 for RHEL 5",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:2.0.0-5.CP07.0jpp.ep1.1.el5",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Network Satellite Server v 5.0",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:5.0.30-0jpp_12rh",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Network Satellite Server v 5.1",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:5.0.30-0jpp_12rh",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "RHAPS Version 2 for RHEL 4",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:5.5.23-0jpp_4rh.9",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1020622",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020622"
|
||||
"url": "http://secunia.com/advisories/37460",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/37460"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:5985",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985"
|
||||
"url": "http://tomcat.apache.org/security-4.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://tomcat.apache.org/security-4.html"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-4.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-4.html"
|
||||
"url": "http://tomcat.apache.org/security-5.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://tomcat.apache.org/security-5.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0862",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
|
||||
"url": "http://tomcat.apache.org/security-6.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://tomcat.apache.org/security-6.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1609",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1609"
|
||||
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-2194",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2194"
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||||
},
|
||||
{
|
||||
"name": "34013",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34013"
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3316",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/3316"
|
||||
},
|
||||
{
|
||||
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2010:0602",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2010:0602"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2823",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2823"
|
||||
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "37460",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37460"
|
||||
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0002.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0002.html"
|
||||
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "31982",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31982"
|
||||
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "31681",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31681"
|
||||
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "32120",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32120"
|
||||
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11181",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181"
|
||||
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||||
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "33999",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33999"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "30496",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30496"
|
||||
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2",
|
||||
"refsource": "MISC",
|
||||
"name": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
||||
},
|
||||
{
|
||||
"name": "31865",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31865"
|
||||
"url": "http://secunia.com/advisories/32120",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/32120"
|
||||
},
|
||||
{
|
||||
"name": "4098",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4098"
|
||||
"url": "http://secunia.com/advisories/32222",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/32222"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-8130",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html"
|
||||
"url": "http://secunia.com/advisories/32266",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/32266"
|
||||
},
|
||||
{
|
||||
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095"
|
||||
"url": "http://secunia.com/advisories/57126",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/57126"
|
||||
},
|
||||
{
|
||||
"name": "31639",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31639"
|
||||
"url": "http://support.apple.com/kb/HT3216",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.apple.com/kb/HT3216"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:018",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
|
||||
},
|
||||
{
|
||||
"name": "36108",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36108"
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:188",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
|
||||
},
|
||||
{
|
||||
"name": "31379",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31379"
|
||||
"url": "http://www.securityfocus.com/bid/31681",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/bid/31681"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2780",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2008/2780"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0320",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0320"
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2823",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2008/2823"
|
||||
},
|
||||
{
|
||||
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:0862",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:0862"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0864",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0864.html"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2009:004",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
||||
"url": "http://secunia.com/advisories/31982",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31982"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-6.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-6.html"
|
||||
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx",
|
||||
"refsource": "MISC",
|
||||
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx"
|
||||
},
|
||||
{
|
||||
"name": "57126",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57126"
|
||||
"url": "http://marc.info/?l=bugtraq&m=123376588623823&w=2",
|
||||
"refsource": "MISC",
|
||||
"name": "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
||||
},
|
||||
{
|
||||
"name": "32222",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32222"
|
||||
"url": "http://secunia.com/advisories/31379",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31379"
|
||||
},
|
||||
{
|
||||
"name": "31891",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31891"
|
||||
"url": "http://secunia.com/advisories/31381",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31381"
|
||||
},
|
||||
{
|
||||
"name": "33797",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33797"
|
||||
"url": "http://secunia.com/advisories/31639",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31639"
|
||||
},
|
||||
{
|
||||
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500"
|
||||
"url": "http://secunia.com/advisories/31865",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31865"
|
||||
},
|
||||
{
|
||||
"name": "20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/505556/100/0/threaded"
|
||||
"url": "http://secunia.com/advisories/31891",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31891"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-7977",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html"
|
||||
"url": "http://secunia.com/advisories/33797",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/33797"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2305",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2305"
|
||||
"url": "http://secunia.com/advisories/33999",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/33999"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-8113",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html"
|
||||
"url": "http://secunia.com/advisories/34013",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/34013"
|
||||
},
|
||||
{
|
||||
"name": "20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/504351/100/0/threaded"
|
||||
"url": "http://secunia.com/advisories/35474",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/35474"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-5.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-5.html"
|
||||
"url": "http://secunia.com/advisories/36108",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/36108"
|
||||
},
|
||||
{
|
||||
"name": "35474",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35474"
|
||||
"url": "http://securityreason.com/securityalert/4098",
|
||||
"refsource": "MISC",
|
||||
"name": "http://securityreason.com/securityalert/4098"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2780",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2780"
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0648.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.redhat.com/support/errata/RHSA-2008-0648.html"
|
||||
},
|
||||
{
|
||||
"name": "31381",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31381"
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0864.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.redhat.com/support/errata/RHSA-2008-0864.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02401",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
||||
"url": "http://www.securityfocus.com/archive/1/495021/100/0/threaded",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/archive/1/495021/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02955",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
||||
"url": "http://www.securityfocus.com/archive/1/504351/100/0/threaded",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/archive/1/504351/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-10-09",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
|
||||
"url": "http://www.securityfocus.com/archive/1/505556/100/0/threaded",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/archive/1/505556/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3216",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3216"
|
||||
"url": "http://www.securityfocus.com/bid/30496",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/bid/30496"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0503",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0503"
|
||||
"url": "http://www.securitytracker.com/id?1020622",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securitytracker.com/id?1020622"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3316",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3316"
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0002.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0002.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT090005",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2305",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2008/2305"
|
||||
},
|
||||
{
|
||||
"name": "tomcat-httpservletresponse-xss(44155)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44155"
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0320",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/0320"
|
||||
},
|
||||
{
|
||||
"name": "20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495021/100/0/threaded"
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0503",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/0503"
|
||||
},
|
||||
{
|
||||
"name": "32266",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32266"
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1609",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/1609"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0648",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0648.html"
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2194",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/2194"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
|
||||
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:0648",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:0648"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
|
||||
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:0864",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:0864"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
|
||||
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:0877",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:0877"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
|
||||
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:1007",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:1007"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
|
||||
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2008-1232",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2008-1232"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/",
|
||||
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
|
||||
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44155",
|
||||
"refsource": "MISC",
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44155"
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181",
|
||||
"refsource": "MISC",
|
||||
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181"
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985",
|
||||
"refsource": "MISC",
|
||||
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985"
|
||||
},
|
||||
{
|
||||
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500",
|
||||
"refsource": "MISC",
|
||||
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500"
|
||||
},
|
||||
{
|
||||
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095",
|
||||
"refsource": "MISC",
|
||||
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095"
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,40 +1,17 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-1676",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Red Hat PKI Common Framework (rhpki-common) in Red Hat Certificate System (aka Certificate Server or RHCS) 7.1 through 7.3, and Netscape Certificate Management System 6.x, does not recognize Certificate Authority profile constraints on Extensions, which might allow remote attackers to bypass intended restrictions and conduct man-in-the-middle attacks by submitting a certificate signing request (CSR) and using the resulting certificate."
|
||||
"value": "CVE-2008-1676 Certificate System: incorrect handling of Extensions in CSRs (cs71)"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,48 +21,124 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Improper Validation of Certificate with Host Mismatch",
|
||||
"cweId": "CWE-297"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Red Hat Certificate System 7.2 for RHEL 4",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:7.2.0-11",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Certificate System 7.3",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:7.3.0-29.el4",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "30062",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30062"
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2008-0500.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://rhn.redhat.com/errata/RHSA-2008-0500.html"
|
||||
},
|
||||
{
|
||||
"name": "rhcs-rhpkicommon-csr-security-bypass(43573)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43573"
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2008-0577.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://rhn.redhat.com/errata/RHSA-2008-0577.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0500",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2008-0500.html"
|
||||
"url": "http://secunia.com/advisories/30929",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/30929"
|
||||
},
|
||||
{
|
||||
"name": "1020427",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020427"
|
||||
"url": "http://www.securityfocus.com/bid/30062",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/bid/30062"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0577",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2008-0577.html"
|
||||
"url": "http://www.securitytracker.com/id?1020427",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securitytracker.com/id?1020427"
|
||||
},
|
||||
{
|
||||
"name": "30929",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30929"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:0500",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:0500"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=445227",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=445227"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:0577",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:0577"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2008-1676",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2008-1676"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=445227",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=445227"
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43573",
|
||||
"refsource": "MISC",
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43573"
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"accessComplexity": "LOW",
|
||||
"accessVector": "NETWORK",
|
||||
"authentication": "NONE",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"baseScore": 7.5,
|
||||
"collateralDamagePotential": "NOT_DEFINED",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"environmentalScore": 0,
|
||||
"exploitability": "NOT_DEFINED",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"remediationLevel": "NOT_DEFINED",
|
||||
"reportConfidence": "NOT_DEFINED",
|
||||
"targetDistribution": "NOT_DEFINED",
|
||||
"temporalScore": 0,
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"version": "2.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,40 +1,17 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-3529",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name."
|
||||
"value": "CVE-2008-3529 libxml2: long entity name heap buffer overflow"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,278 +21,351 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Heap-based Buffer Overflow",
|
||||
"cweId": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 2.1",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:2.4.19-11.ent",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 3",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:2.5.10-13",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 4",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:2.6.16-12.5",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 5",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:2.6.26-2.1.2.6",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "USN-815-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-815-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-644-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/644-1/"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-400.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-400.htm"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3639",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3639"
|
||||
},
|
||||
{
|
||||
"name": "31860",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31860"
|
||||
},
|
||||
{
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1"
|
||||
},
|
||||
{
|
||||
"name": "32280",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32280"
|
||||
},
|
||||
{
|
||||
"name": "31855",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31855"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1621",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1621"
|
||||
},
|
||||
{
|
||||
"name": "libxml2-entitynames-bo(45085)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45085"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3549",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3549"
|
||||
},
|
||||
{
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1"
|
||||
},
|
||||
{
|
||||
"name": "32807",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32807"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2009-06-08-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "31982",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31982"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=461015",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461015"
|
||||
},
|
||||
{
|
||||
"name": "31868",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31868"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1654",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1654"
|
||||
},
|
||||
{
|
||||
"name": "http://xmlsoft.org/news.html",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://xmlsoft.org/news.html"
|
||||
"name": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6103",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6103"
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1298",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1298"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "35074",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35074"
|
||||
"url": "http://secunia.com/advisories/31558",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31558"
|
||||
},
|
||||
{
|
||||
"name": "8798",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/8798"
|
||||
"url": "http://secunia.com/advisories/31855",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31855"
|
||||
},
|
||||
{
|
||||
"name": "36173",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36173"
|
||||
"url": "http://secunia.com/advisories/31982",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31982"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0884",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0884.html"
|
||||
"url": "http://secunia.com/advisories/32807",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/32807"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1522",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1522"
|
||||
"url": "http://secunia.com/advisories/32974",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/32974"
|
||||
},
|
||||
{
|
||||
"name": "1020855",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1020855"
|
||||
"url": "http://secunia.com/advisories/35379",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/35379"
|
||||
},
|
||||
{
|
||||
"name": "32265",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32265"
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200812-06.xml",
|
||||
"refsource": "MISC",
|
||||
"name": "http://security.gentoo.org/glsa/glsa-200812-06.xml"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200812-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200812-06.xml"
|
||||
"url": "http://support.apple.com/kb/HT3613",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.apple.com/kb/HT3613"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2009-06-17-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
|
||||
"url": "http://support.apple.com/kb/HT3639",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.apple.com/kb/HT3639"
|
||||
},
|
||||
{
|
||||
"name": "33715",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33715"
|
||||
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0325",
|
||||
"refsource": "MISC",
|
||||
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0325"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:018",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:192",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:192"
|
||||
},
|
||||
{
|
||||
"name": "35056",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35056"
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1522",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/1522"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0325",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0325"
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1621",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/1621"
|
||||
},
|
||||
{
|
||||
"name": "247346",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-247346-1"
|
||||
"url": "http://xmlsoft.org/news.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://xmlsoft.org/news.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2009-05-12",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
|
||||
"url": "https://usn.ubuntu.com/644-1/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/644-1/"
|
||||
},
|
||||
{
|
||||
"name": "31126",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31126"
|
||||
"url": "http://secunia.com/advisories/35074",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/35074"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-025.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-025.htm"
|
||||
"url": "http://support.apple.com/kb/HT3549",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.apple.com/kb/HT3549"
|
||||
},
|
||||
{
|
||||
"name": "35379",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35379"
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
|
||||
},
|
||||
{
|
||||
"name": "33722",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33722"
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1297",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/1297"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:192",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:192"
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "32974",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32974"
|
||||
"url": "http://secunia.com/advisories/31860",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31860"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11760",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11760"
|
||||
"url": "http://secunia.com/advisories/31868",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/31868"
|
||||
},
|
||||
{
|
||||
"name": "36235",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36235"
|
||||
"url": "http://secunia.com/advisories/32265",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/32265"
|
||||
},
|
||||
{
|
||||
"name": "TA09-133A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
|
||||
"url": "http://secunia.com/advisories/32280",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/32280"
|
||||
},
|
||||
{
|
||||
"name": "265329",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1"
|
||||
"url": "http://secunia.com/advisories/33715",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/33715"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1297",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1297"
|
||||
"url": "http://secunia.com/advisories/33722",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/33722"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3550",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3550"
|
||||
"url": "http://secunia.com/advisories/35056",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/35056"
|
||||
},
|
||||
{
|
||||
"name": "261688",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1"
|
||||
"url": "http://secunia.com/advisories/36173",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/36173"
|
||||
},
|
||||
{
|
||||
"name": "31558",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31558"
|
||||
"url": "http://secunia.com/advisories/36235",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/36235"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3613",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3613"
|
||||
"url": "http://securitytracker.com/id?1020855",
|
||||
"refsource": "MISC",
|
||||
"name": "http://securitytracker.com/id?1020855"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2822",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2822"
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1",
|
||||
"refsource": "MISC",
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0886",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0886.html"
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1",
|
||||
"refsource": "MISC",
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1"
|
||||
},
|
||||
{
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-247346-1",
|
||||
"refsource": "MISC",
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-247346-1"
|
||||
},
|
||||
{
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1",
|
||||
"refsource": "MISC",
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1"
|
||||
},
|
||||
{
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1",
|
||||
"refsource": "MISC",
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1"
|
||||
},
|
||||
{
|
||||
"url": "http://support.apple.com/kb/HT3550",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.apple.com/kb/HT3550"
|
||||
},
|
||||
{
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-400.htm",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-400.htm"
|
||||
},
|
||||
{
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-025.htm",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-025.htm"
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2008/dsa-1654",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.debian.org/security/2008/dsa-1654"
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0884.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.redhat.com/support/errata/RHSA-2008-0884.html"
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0886.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.redhat.com/support/errata/RHSA-2008-0886.html"
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/31126",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/bid/31126"
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/USN-815-1",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.ubuntu.com/usn/USN-815-1"
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2822",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2008/2822"
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1298",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2009/1298"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:0884",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:0884"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2008:0886",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2008:0886"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2008-3529",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2008-3529"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461015",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=461015"
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45085",
|
||||
"refsource": "MISC",
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45085"
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11760",
|
||||
"refsource": "MISC",
|
||||
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11760"
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6103",
|
||||
"refsource": "MISC",
|
||||
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6103"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/8798",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/8798"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,40 +1,17 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-4643",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document."
|
||||
"value": "CVE-2010-4643 OpenOffice.org: heap based buffer overflow when parsing TGA files"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,123 +21,219 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "Heap-based Buffer Overflow",
|
||||
"cweId": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 4",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:1.1.5-10.7.el4_8.10",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "1:2.0.4-5.7.0.6.1.el4_8.8",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 5",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "1:3.1.1-19.5.el5_5.6",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 6",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "1:3.2.1-19.6.el6_0.5",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "40775",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/40775"
|
||||
"url": "http://secunia.com/advisories/40775",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/40775"
|
||||
},
|
||||
{
|
||||
"name": "46031",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46031"
|
||||
"url": "http://secunia.com/advisories/43105",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/43105"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2151",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2151"
|
||||
"url": "http://secunia.com/advisories/60799",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/60799"
|
||||
},
|
||||
{
|
||||
"name": "60799",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60799"
|
||||
"url": "http://ubuntu.com/usn/usn-1056-1",
|
||||
"refsource": "MISC",
|
||||
"name": "http://ubuntu.com/usn/usn-1056-1"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201408-19",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0230",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2011/0230"
|
||||
},
|
||||
{
|
||||
"name": "43118",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43118"
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0279",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2011/0279"
|
||||
},
|
||||
{
|
||||
"name": "43065",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43065"
|
||||
"url": "http://secunia.com/advisories/42999",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/42999"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0230",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0230"
|
||||
"url": "http://secunia.com/advisories/43065",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/43065"
|
||||
},
|
||||
{
|
||||
"name": "1025002",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025002"
|
||||
"url": "http://secunia.com/advisories/43118",
|
||||
"refsource": "MISC",
|
||||
"name": "http://secunia.com/advisories/43118"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0232",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0232"
|
||||
"url": "http://www.debian.org/security/2011/dsa-2151",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.debian.org/security/2011/dsa-2151"
|
||||
},
|
||||
{
|
||||
"name": "70718",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/70718"
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:027",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:027"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0182",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0182.html"
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667588",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667588"
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0181.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.redhat.com/support/errata/RHSA-2011-0181.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1056-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://ubuntu.com/usn/usn-1056-1"
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0182.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.redhat.com/support/errata/RHSA-2011-0182.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0181",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0181.html"
|
||||
"url": "http://www.securityfocus.com/bid/46031",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/bid/46031"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0279",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0279"
|
||||
"url": "http://www.securitytracker.com/id?1025002",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securitytracker.com/id?1025002"
|
||||
},
|
||||
{
|
||||
"name": "ooo-tga-bo(65441)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65441"
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0232",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.vupen.com/english/advisories/2011/0232"
|
||||
},
|
||||
{
|
||||
"name": "43105",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43105"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2011:0181",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2011:0181"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:027",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:027"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2011:0182",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2011:0182"
|
||||
},
|
||||
{
|
||||
"name": "42999",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42999"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2011:0183",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2011:0183"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openoffice.org/security/cves/CVE-2010-4643.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openoffice.org/security/cves/CVE-2010-4643.html"
|
||||
"url": "http://osvdb.org/70718",
|
||||
"refsource": "MISC",
|
||||
"name": "http://osvdb.org/70718"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openoffice.org/security/cves/CVE-2010-4643.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.openoffice.org/security/cves/CVE-2010-4643.html"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2010-4643",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2010-4643"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667588",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667588"
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65441",
|
||||
"refsource": "MISC",
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65441"
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"accessComplexity": "MEDIUM",
|
||||
"accessVector": "NETWORK",
|
||||
"authentication": "NONE",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"baseScore": 6.8,
|
||||
"collateralDamagePotential": "NOT_DEFINED",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"environmentalScore": 0,
|
||||
"exploitability": "NOT_DEFINED",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"remediationLevel": "NOT_DEFINED",
|
||||
"reportConfidence": "NOT_DEFINED",
|
||||
"targetDistribution": "NOT_DEFINED",
|
||||
"temporalScore": 0,
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||||
"version": "2.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,131 +1,159 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2018-14625",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "kernel",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "[UNKNOWN]"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients."
|
||||
"value": "A flaw was found where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly impersonate AF_VSOCK messages destined to other clients or leak kernel memory."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
[
|
||||
{
|
||||
"vectorString": "5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-416"
|
||||
"value": "Use After Free",
|
||||
"cweId": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:3.10.0-1062.rt56.1022.el7",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:3.10.0-1062.el7",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:4.14.0-115.16.1.el7a",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625"
|
||||
},
|
||||
{
|
||||
"name": "USN-3872-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3872-1/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3878-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3878-1/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3871-5",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3871-5/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3878-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3878-2/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3871-4",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3871-4/"
|
||||
},
|
||||
{
|
||||
"name": "https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039",
|
||||
"url": "https://usn.ubuntu.com/3871-1/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039"
|
||||
"name": "https://usn.ubuntu.com/3871-1/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3871-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3871-1/"
|
||||
"url": "https://usn.ubuntu.com/3871-3/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/3871-3/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3871-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3871-3/"
|
||||
"url": "https://usn.ubuntu.com/3871-4/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/3871-4/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"
|
||||
"url": "https://usn.ubuntu.com/3871-5/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/3871-5/"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2043",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2043"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2029",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2019:2029"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2029",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2029"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2043",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2019:2043"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:4154",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:4154"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:4154",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2019:4154"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2018-14625",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2018-14625"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619846",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1619846"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"
|
||||
},
|
||||
{
|
||||
"url": "https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039",
|
||||
"refsource": "MISC",
|
||||
"name": "https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039"
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3872-1/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/3872-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3878-1/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/3878-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3878-2/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/3878-2/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,101 +1,129 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2018-1118",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "vhost",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "since 4.8"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "kernel"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file."
|
||||
"value": "The Linux kernel does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
[
|
||||
{
|
||||
"vectorString": "2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-665"
|
||||
"value": "Improper Initialization",
|
||||
"cweId": "CWE-665"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:3.10.0-957.rt56.910.el7",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:4.14.0-115.el7a",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:3.10.0-957.el7",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2018:3083",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3083"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2948",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2018:2948"
|
||||
},
|
||||
{
|
||||
"name": "USN-3762-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3762-1/"
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3083",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2018:3083"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2948",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3096",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2018:3096"
|
||||
},
|
||||
{
|
||||
"name": "USN-3762-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3762-2/"
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2018-1118",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2018-1118"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3096",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3096"
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118"
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118"
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3762-1/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/3762-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3762-2/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/3762-2/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -1,25 +1,157 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14868",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A flaw was found in the way ksh evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
|
||||
"cweId": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "KornShell",
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "ksh",
|
||||
"product_name": "Red Hat Enterprise Linux 6",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "20120801"
|
||||
"version_value": "0:20120801-38.el6_10",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-140.el7_7",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7.2 Advanced Update Support",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-26.el7_2",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-27.el7_3",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7.4 Advanced Update Support",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-36.el7_4",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7.4 Telco Extended Update Support",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-36.el7_4",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-36.el7_4",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7.5 Extended Update Support",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-138.el7_5",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-140.el7_6",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 8",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-253.el8_1",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:20120801-253.el8_0",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -30,63 +162,112 @@
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT211170",
|
||||
"refsource": "MISC",
|
||||
"name": "https://support.apple.com/kb/HT211170"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2020/May/53",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2020/May/53"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0431",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0431"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0515",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0515"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0559",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0559"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0568",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0568"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:1332",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:1332"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:1333",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:1333"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:2210",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:2210"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:5351",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:5351"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:5352",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:5352"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2019-14868",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2019-14868"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757324",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1757324"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14868",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14868",
|
||||
"refsource": "CONFIRM"
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14868"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/att/ast/commit/c7de8b641266bac7c77942239ac659edfee9ecd2",
|
||||
"name": "https://github.com/att/ast/commit/c7de8b641266bac7c77942239ac659edfee9ecd2",
|
||||
"refsource": "MISC"
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/att/ast/commit/c7de8b641266bac7c77942239ac659edfee9ecd2"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT211170",
|
||||
"url": "https://support.apple.com/kb/HT211170"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200529 APPLE-SA-2020-05-26-3 macOS Catalina 10.15.5, Security Update 2020-003 Mojave, Security Update 2020-003 High Sierra",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/May/53"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200720 [SECURITY] [DLA 2284-1] ksh security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00015.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely."
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00015.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.debian.org/debian-lts-announce/2020/07/msg00015.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
"work_around": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "No known mitigation available."
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
[
|
||||
{
|
||||
"vectorString": "7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
{
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,28 +1,58 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14894",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A flaw was found in the CloudForms management engine, which triggered remote code execution through NFS schedule backup. An attacker logged into the management console could use this flaw to execute arbitrary shell commands on the CloudForms server as root."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
|
||||
"cweId": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "[UNKNOWN]",
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "CloudForms",
|
||||
"product_name": "CloudForms Management Engine 5.10",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "5.10"
|
||||
},
|
||||
"version_value": "0:5.10.15.1-1.el7cf",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "CloudForms Management Engine 5.11",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "5.11"
|
||||
"version_value": "0:5.11.3.1-1.el8cf",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -33,51 +63,57 @@
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14894",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14894",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0588",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0588"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A flaw was found in the CloudForms management engine version 5.10 and CloudForms management version 5.11, which triggered remote code execution through NFS schedule backup. An attacker logged into the management console could use this flaw to execute arbitrary shell commands on the CloudForms server as root."
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0589",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0589"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2019-14894",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2019-14894"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769411",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1769411"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14894",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14894"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was discovered by Jaroslav Henner (Red Hat)."
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
[
|
||||
{
|
||||
"vectorString": "8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
{
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"scope": "CHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,25 +1,66 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14898",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The fix for CVE-2019-11599 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Improper Locking",
|
||||
"cweId": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Linux kernel",
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "kernel",
|
||||
"product_name": "Red Hat Enterprise Linux 7",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "< 5.0.10"
|
||||
"version_value": "0:3.10.0-1062.12.1.rt56.1042.el7",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:3.10.0-1062.12.1.el7",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 8",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:4.18.0-147.5.1.rt24.98.el8_1",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "0:4.18.0-147.5.1.el8_1",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -30,26 +71,6 @@
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
@ -78,33 +99,75 @@
|
||||
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1790"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0328",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0328"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0339",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0339"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0374",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0374"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0375",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0375"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2019-14898",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2019-14898"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774671",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1774671"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14898",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14898",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14898"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls."
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"work_around": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
|
||||
}
|
||||
],
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was discovered by Vladis Dronov (Red Hat Engineering)."
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
[
|
||||
{
|
||||
"vectorString": "7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
{
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,25 +1,80 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-1707",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/postgresql-apb. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Incorrect Permission Assignment for Critical Resource",
|
||||
"cweId": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "[UNKNOWN]",
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "openshift/postgresql-apb",
|
||||
"product_name": "Red Hat OpenShift Container Platform 3.11",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
"version_value": "v3.11.188-4",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat OpenShift Container Platform 4.1",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "v4.1.37-202003021622",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat OpenShift Container Platform 4.2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "v4.2.21-202002240343",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat OpenShift Container Platform 4.3",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "v4.3.5-202003020549",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -30,43 +85,72 @@
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1707",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1707",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"url": "https://access.redhat.com/articles/4859371",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/articles/4859371"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in all openshift/postgresql-apb 4.x.x versions prior to 4.3.0, where an insecure modification vulnerability in the /etc/passwd file was found in the container openshift/postgresql-apb. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges."
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0617",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0617"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0681",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0681"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0694",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0694"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0801",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2020:0801"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2020-1707",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2020-1707"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793301",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1793301"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1707",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1707"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Red Hat would like to thank Joseph LaMagna-Reiter (SPR Inc.) for reporting this issue."
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
[
|
||||
{
|
||||
"vectorString": "7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
]
|
||||
{
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,25 +1,47 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-1354",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Out-of-bounds Read",
|
||||
"cweId": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "libtiff",
|
||||
"product_name": "Red Hat Enterprise Linux 9",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Not-Known"
|
||||
"version_value": "0:4.4.0-2.el9",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -30,67 +52,70 @@
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-125 - Out-of-bounds Read."
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/issues/319",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
|
||||
"name": "https://gitlab.com/libtiff/libtiff/-/issues/319"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.com/libtiff/libtiff/-/issues/319",
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
|
||||
"name": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2022-1354",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2022-1354"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2022:8194",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2022-1354",
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2022-1354"
|
||||
"name": "https://access.redhat.com/errata/RHSA-2022:8194"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221014-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202210-10",
|
||||
"url": "https://security.gentoo.org/glsa/202210-10"
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
|
||||
"url": "https://security.gentoo.org/glsa/202210-10",
|
||||
"refsource": "MISC",
|
||||
"name": "https://security.gentoo.org/glsa/202210-10"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5333",
|
||||
"url": "https://www.debian.org/security/2023/dsa-5333"
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221014-0007/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221014-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5333",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.debian.org/security/2023/dsa-5333"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service."
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,25 +1,58 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-1355",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Stack-based Buffer Overflow",
|
||||
"cweId": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "libtiff",
|
||||
"product_name": "Red Hat Enterprise Linux 8",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Not-Known"
|
||||
"version_value": "0:4.0.9-23.el8",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Red Hat Enterprise Linux 9",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0:4.4.0-2.el9",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -30,67 +63,75 @@
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-121 - Stack-based Buffer Overflow."
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/issues/400",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
|
||||
"name": "https://gitlab.com/libtiff/libtiff/-/issues/400"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.com/libtiff/libtiff/-/issues/400",
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
|
||||
"name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2022-1355",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323",
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/323"
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2022-1355"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2022:8194",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2022-1355",
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2022-1355"
|
||||
"name": "https://access.redhat.com/errata/RHSA-2022:8194"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221014-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202210-10",
|
||||
"url": "https://security.gentoo.org/glsa/202210-10"
|
||||
"url": "https://security.gentoo.org/glsa/202210-10",
|
||||
"refsource": "MISC",
|
||||
"name": "https://security.gentoo.org/glsa/202210-10"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221014-0007/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221014-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5333",
|
||||
"url": "https://www.debian.org/security/2023/dsa-5333"
|
||||
"url": "https://www.debian.org/security/2023/dsa-5333",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.debian.org/security/2023/dsa-5333"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2022:7585",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2022:7585"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service."
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,25 +1,55 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2832",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CVE-2022-2832 blender: Null pointer reference in blender thumbnail extractor"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Use of NullPointerException Catch to Detect NULL Pointer Dereference",
|
||||
"cweId": "CWE-395"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"vendor_name": "Red Hat",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Blender",
|
||||
"product_name": "OSE-OSC-1.3-RHEL-8",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Blender 3.3.0"
|
||||
"version_value": "1.3.1-5",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.1-6",
|
||||
"version_affected": "!"
|
||||
},
|
||||
{
|
||||
"version_value": "1.3.1-10",
|
||||
"version_affected": "!"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -30,42 +60,61 @@
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-395"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://developer.blender.org/T99706",
|
||||
"refsource": "MISC",
|
||||
"name": "https://developer.blender.org/T99706",
|
||||
"url": "https://developer.blender.org/T99706"
|
||||
"name": "https://developer.blender.org/T99706"
|
||||
},
|
||||
{
|
||||
"url": "https://developer.blender.org/D15463",
|
||||
"refsource": "MISC",
|
||||
"name": "https://developer.blender.org/D15463",
|
||||
"url": "https://developer.blender.org/D15463"
|
||||
"name": "https://developer.blender.org/D15463"
|
||||
},
|
||||
{
|
||||
"url": "https://developer.blender.org/rB00dc7477022acdd969e4d709a235c0be819efa6c",
|
||||
"refsource": "MISC",
|
||||
"name": "https://developer.blender.org/rB00dc7477022acdd969e4d709a235c0be819efa6c",
|
||||
"url": "https://developer.blender.org/rB00dc7477022acdd969e4d709a235c0be819efa6c"
|
||||
"name": "https://developer.blender.org/rB00dc7477022acdd969e4d709a235c0be819efa6c"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2022:7058",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/errata/RHSA-2022:7058"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2022-2832",
|
||||
"refsource": "MISC",
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2022-2832"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118556",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2118556"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Red Hat would like to thank sangjun for reporting this issue."
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A flaw was found in Blender 3.3.0. A null pointer dereference exists in source/blender/gpu/opengl/gl_backend.cc that may lead to loss of confidentiality and integrity."
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,105 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-0646",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability classified as critical was found in dst-admin 1.5.0. Affected by this vulnerability is an unknown functionality of the file /home/cavesConsole. The manipulation of the argument command leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220033 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "In dst-admin 1.5.0 wurde eine kritische Schwachstelle entdeckt. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /home/cavesConsole. Dank der Manipulation des Arguments command mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-77 Command Injection",
|
||||
"cweId": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "dst-admin",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "1.5.0",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.220033",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.220033"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.220033",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.220033"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0cavesConsole%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0cavesConsole%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "yanfei.chen (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 6.5,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,105 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-0647",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Eine kritische Schwachstelle wurde in dst-admin 1.5.0 entdeckt. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /home/kickPlayer. Dank Manipulation des Arguments userId mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-77 Command Injection",
|
||||
"cweId": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "dst-admin",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "1.5.0",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.220034",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.220034"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.220034",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.220034"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "yanfei.chen (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 6.5,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,105 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-0648",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability, which was classified as critical, was found in dst-admin 1.5.0. This affects an unknown part of the file /home/masterConsole. The manipulation of the argument command leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-220035."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Es wurde eine kritische Schwachstelle in dst-admin 1.5.0 gefunden. Es betrifft eine unbekannte Funktion der Datei /home/masterConsole. Mit der Manipulation des Arguments command mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-77 Command Injection",
|
||||
"cweId": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "dst-admin",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "1.5.0",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.220035",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.220035"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.220035",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.220035"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0masterConsole%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0masterConsole%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "yanfei.chen (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 6.5,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,105 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-0649",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability has been found in dst-admin 1.5.0 and classified as critical. This vulnerability affects unknown code of the file /home/sendBroadcast. The manipulation of the argument message leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220036."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "In dst-admin 1.5.0 wurde eine kritische Schwachstelle gefunden. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /home/sendBroadcast. Durch die Manipulation des Arguments message mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-77 Command Injection",
|
||||
"cweId": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "dst-admin",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "1.5.0",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.220036",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.220036"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.220036",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.220036"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0sendBroadcast%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0sendBroadcast%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "yanfei.chen (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 6.3,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 6.5,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,159 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-0650",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The name of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Eine problematische Schwachstelle wurde in YAFNET bis 3.1.11 gefunden. Dies betrifft einen unbekannten Teil der Komponente Signature Handler. Durch Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 3.1.12 vermag dieses Problem zu l\u00f6sen. Der Patch wird als a1442a2bacc3335461b44c250e81f8d99c60735f bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Cross Site Scripting",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "YAFNET",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "3.1.0",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.1",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.2",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.3",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.4",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.5",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.6",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.7",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.8",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.9",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.10",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "3.1.11",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.220037",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.220037"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.220037",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.220037"
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1iJuhjLQy3QPIgKKgWUzEEfr_q0boaR00?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"name": "https://drive.google.com/drive/folders/1iJuhjLQy3QPIgKKgWUzEEfr_q0boaR00?usp=sharing"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/YAFNET/YAFNET/commit/a1442a2bacc3335461b44c250e81f8d99c60735f",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/YAFNET/YAFNET/commit/a1442a2bacc3335461b44c250e81f8d99c60735f"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/YAFNET/YAFNET/releases/tag/v3.1.12",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/YAFNET/YAFNET/releases/tag/v3.1.12"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lin7lic (VulDB User)"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 4,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user