"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-02-13 00:03:29 +00:00
parent 252072c5ae
commit c732752b97
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
7 changed files with 279 additions and 351 deletions

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4314", "ID": "CVE-2011-4314",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,67 +27,91 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "RHSA-2011:1804", "url": "http://openid.net/2011/05/05/attribute-exchange-security-alert/",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1804.html" "name": "http://openid.net/2011/05/05/attribute-exchange-security-alert/"
}, },
{ {
"name": "44496", "url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/44496" "name": "http://rhn.redhat.com/errata/RHSA-2012-0441.html"
}, },
{ {
"name": "http://openid.net/2011/05/05/attribute-exchange-security-alert/", "url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://openid.net/2011/05/05/attribute-exchange-security-alert/" "name": "http://rhn.redhat.com/errata/RHSA-2012-0519.html"
}, },
{ {
"name": "RHSA-2012:0519", "url": "http://secunia.com/advisories/44496",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html" "name": "http://secunia.com/advisories/44496"
}, },
{ {
"name": "48954", "url": "http://secunia.com/advisories/48697",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48954" "name": "http://secunia.com/advisories/48697"
}, },
{ {
"name": "RHSA-2012:0441", "url": "http://secunia.com/advisories/48954",
"refsource": "REDHAT", "refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html" "name": "http://secunia.com/advisories/48954"
}, },
{ {
"name": "[oss-security] 20111116 CVE Request: openid4java not properly verifying the signature of Attribute Exchange (AX) information", "url": "http://securitytracker.com/id?1026400",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/11/16/1" "name": "http://securitytracker.com/id?1026400"
}, },
{ {
"name": "https://issues.jboss.org/browse/SOA-3597", "url": "http://www.openwall.com/lists/oss-security/2011/11/16/1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://issues.jboss.org/browse/SOA-3597" "name": "http://www.openwall.com/lists/oss-security/2011/11/16/1"
}, },
{ {
"name": "https://issues.jboss.org/browse/JBEPP-1368", "url": "http://www.openwall.com/lists/oss-security/2011/11/17/1",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://issues.jboss.org/browse/JBEPP-1368" "name": "http://www.openwall.com/lists/oss-security/2011/11/17/1"
}, },
{ {
"name": "1026400", "url": "http://www.redhat.com/support/errata/RHSA-2011-1804.html",
"refsource": "SECTRACK", "refsource": "MISC",
"url": "http://securitytracker.com/id?1026400" "name": "http://www.redhat.com/support/errata/RHSA-2011-1804.html"
}, },
{ {
"name": "[oss-security] 20111116 Re: CVE Request: openid4java not properly verifying the signature of Attribute Exchange (AX) information", "url": "https://issues.jboss.org/browse/JBEPP-1368",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/11/17/1" "name": "https://issues.jboss.org/browse/JBEPP-1368"
}, },
{ {
"name": "48697", "url": "https://issues.jboss.org/browse/SOA-3597",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48697" "name": "https://issues.jboss.org/browse/SOA-3597"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4315", "ID": "CVE-2011-4315",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,57 +27,81 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "[oss-security] 20111117 Re: CVE Request: nginx resolver heap overflow", "url": "http://secunia.com/advisories/48577",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/11/17/10" "name": "http://secunia.com/advisories/48577"
}, },
{ {
"name": "FEDORA-2011-16075", "url": "http://security.gentoo.org/glsa/glsa-201203-22.xml",
"refsource": "FEDORA", "refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070569.html" "name": "http://security.gentoo.org/glsa/glsa-201203-22.xml"
}, },
{ {
"name": "SUSE-SU-2011:1300", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070569.html",
"refsource": "SUSE", "refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00005.html" "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070569.html"
}, },
{ {
"name": "http://www.nginx.org/en/CHANGES-1.0", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00005.html",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.nginx.org/en/CHANGES-1.0" "name": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00005.html"
}, },
{ {
"name": "http://trac.nginx.org/nginx/changeset/4268/nginx", "url": "http://openwall.com/lists/oss-security/2011/11/17/10",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://trac.nginx.org/nginx/changeset/4268/nginx" "name": "http://openwall.com/lists/oss-security/2011/11/17/10"
}, },
{ {
"name": "[oss-security] 20111117 CVE Request: nginx resolver heap overflow", "url": "http://openwall.com/lists/oss-security/2011/11/17/8",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/11/17/8" "name": "http://openwall.com/lists/oss-security/2011/11/17/8"
}, },
{ {
"name": "48577", "url": "http://secunia.com/advisories/47097",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/48577" "name": "http://secunia.com/advisories/47097"
}, },
{ {
"name": "47097", "url": "http://trac.nginx.org/nginx/changeset/4268/nginx",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/47097" "name": "http://trac.nginx.org/nginx/changeset/4268/nginx"
}, },
{ {
"name": "GLSA-201203-22", "url": "http://www.nginx.org/en/CHANGES-1.0",
"refsource": "GENTOO", "refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201203-22.xml" "name": "http://www.nginx.org/en/CHANGES-1.0"
}, },
{ {
"name": "50710", "url": "http://www.securityfocus.com/bid/50710",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/50710" "name": "http://www.securityfocus.com/bid/50710"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4324", "ID": "CVE-2011-4324",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,32 +27,56 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9", "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9" "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29"
}, },
{ {
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29" "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9"
}, },
{ {
"name": "[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS", "url": "http://www.openwall.com/lists/oss-security/2012/02/06/3",
"refsource": "MLIST", "refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/02/06/3" "name": "http://www.openwall.com/lists/oss-security/2012/02/06/3"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755440", "url": "https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=755440" "name": "https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9"
}, },
{ {
"name": "https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=755440",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=755440"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2011-4325 kernel: nfs: diotest4 from LTP crash client null pointer deref" "value": "The NFS implementation in Linux kernel before 2.6.31-rc6 calls certain functions without properly initializing certain data, which allows local users to cause a denial of service (NULL pointer dereference and O_DIRECT oops), as demonstrated using diotest4 from LTP."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "NULL Pointer Dereference", "value": "n/a"
"cweId": "CWE-476"
} }
] ]
} }
@ -32,16 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 5", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:2.6.18-274.17.1.el5", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
} }
] ]
} }
@ -65,49 +64,14 @@
"name": "http://www.securityfocus.com/bid/51366" "name": "http://www.securityfocus.com/bid/51366"
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2012:0007", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72297",
"refsource": "MISC", "refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2012:0007" "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72297"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-4325",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-4325"
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=755455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=755455",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755455" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=755455"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72297",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72297"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.9,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "NONE",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4345", "ID": "CVE-2011-4345",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,37 +27,61 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=756348", "url": "http://secunia.com/advisories/46925",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=756348" "name": "http://secunia.com/advisories/46925"
}, },
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "url": "http://www.namazu.org/security.html#cross-site-scripting",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" "name": "http://www.namazu.org/security.html#cross-site-scripting"
}, },
{ {
"name": "50771", "url": "http://www.securityfocus.com/bid/50771",
"refsource": "BID", "refsource": "MISC",
"url": "http://www.securityfocus.com/bid/50771" "name": "http://www.securityfocus.com/bid/50771"
}, },
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
}, },
{ {
"name": "http://www.namazu.org/security.html#cross-site-scripting", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://www.namazu.org/security.html#cross-site-scripting" "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
}, },
{ {
"name": "46925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756348",
"refsource": "SECUNIA", "refsource": "MISC",
"url": "http://secunia.com/advisories/46925" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=756348"
} }
] ]
} }

View File

@ -1,35 +1,12 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4354", "ID": "CVE-2011-4354",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
@ -50,47 +27,71 @@
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name": "http://crypto.di.uminho.pt/CACE/CT-RSA2012-openssl-src.zip", "url": "http://www.debian.org/security/2012/dsa-2390",
"refsource": "MISC", "refsource": "MISC",
"url": "http://crypto.di.uminho.pt/CACE/CT-RSA2012-openssl-src.zip" "name": "http://www.debian.org/security/2012/dsa-2390"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=757909", "url": "http://crypto.di.uminho.pt/CACE/CT-RSA2012-openssl-src.zip",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=757909"
},
{
"name": "[oss-security] 20111201 CVE-2011-4354 OpenSSL 0.9.8g (32-bit builds) bug leaks ECC private keys",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/12/01/6"
},
{
"name": "http://eprint.iacr.org/2011/633",
"refsource": "MISC", "refsource": "MISC",
"url": "http://eprint.iacr.org/2011/633" "name": "http://crypto.di.uminho.pt/CACE/CT-RSA2012-openssl-src.zip"
}, },
{ {
"name": "http://rt.openssl.org/Ticket/Display.html?id=1593&user=guest&pass=guest", "url": "http://cvs.openssl.org/filediff?f=openssl/crypto/bn/bn_nist.c&v1=1.14&v2=1.21",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://rt.openssl.org/Ticket/Display.html?id=1593&user=guest&pass=guest" "name": "http://cvs.openssl.org/filediff?f=openssl/crypto/bn/bn_nist.c&v1=1.14&v2=1.21"
}, },
{ {
"name": "http://cvs.openssl.org/filediff?f=openssl/crypto/bn/bn_nist.c&v1=1.14&v2=1.21", "url": "http://eprint.iacr.org/2011/633",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://cvs.openssl.org/filediff?f=openssl/crypto/bn/bn_nist.c&v1=1.14&v2=1.21" "name": "http://eprint.iacr.org/2011/633"
}, },
{ {
"name": "DSA-2390", "url": "http://marc.info/?t=119271238800004",
"refsource": "DEBIAN", "refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2390" "name": "http://marc.info/?t=119271238800004"
}, },
{ {
"name": "http://marc.info/?t=119271238800004", "url": "http://openwall.com/lists/oss-security/2011/12/01/6",
"refsource": "CONFIRM", "refsource": "MISC",
"url": "http://marc.info/?t=119271238800004" "name": "http://openwall.com/lists/oss-security/2011/12/01/6"
},
{
"url": "http://rt.openssl.org/Ticket/Display.html?id=1593&user=guest&pass=guest",
"refsource": "MISC",
"name": "http://rt.openssl.org/Ticket/Display.html?id=1593&user=guest&pass=guest"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=757909",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=757909"
} }
] ]
} }

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "CVE-2011-4355 gdb: object file .debug_gdb_scripts section improper input validation" "value": "GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts."
} }
] ]
}, },
@ -21,8 +21,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "Improper Input Validation", "value": "n/a"
"cweId": "CWE-20"
} }
] ]
} }
@ -32,16 +31,16 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "Red Hat", "vendor_name": "n/a",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "Red Hat Enterprise Linux 6", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "0:7.2-60.el6", "version_affected": "=",
"version_affected": "!" "version_value": "n/a"
} }
] ]
} }
@ -78,46 +77,6 @@
"url": "http://www.securitytracker.com/id/1028191", "url": "http://www.securitytracker.com/id/1028191",
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028191" "name": "http://www.securitytracker.com/id/1028191"
},
{
"url": "https://access.redhat.com/errata/RHSA-2013:0522",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2013:0522"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2011-4355",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2011-4355"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703238",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703238"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.7,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
} }
] ]
} }