cvelist/2017/1000xxx/CVE-2017-1000375.json

68 lines
1.9 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ID" : "CVE-2017-1000375",
"REQUESTER" : "qsa@qualys.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "NetBSD",
"version" : {
"version_data" : [
{
"version_value" : "7.1"
}
]
}
}
]
},
"vendor_name" : "NetBSD"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows attackers to more easily manipulate memory leading to arbitrary code execution. This affects NetBSD 7.1 and possibly earlier versions."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "A specific CWE doesn't exist, listing as unknown for now"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.exploit-db.com/exploits/42272/"
},
{
"url" : "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"url" : "http://www.securityfocus.com/bid/99257"
}
]
}
}