mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
148 lines
4.9 KiB
JSON
148 lines
4.9 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-2379",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via unknown vectors related to IP source routing."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20060627 Re: Is Windows TCP/IP source routing PoC code available?",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/438482/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "20060628 Re[2]: Is Windows TCP/IP source routing PoC code available?",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/438609/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "20060625 Is Windows TCP/IP source routing PoC code available?",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/46702"
|
|
},
|
|
{
|
|
"name" : "MS06-032",
|
|
"refsource" : "MS",
|
|
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-032"
|
|
},
|
|
{
|
|
"name" : "TA06-164A",
|
|
"refsource" : "CERT",
|
|
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-164A.html"
|
|
},
|
|
{
|
|
"name" : "VU#722753",
|
|
"refsource" : "CERT-VN",
|
|
"url" : "http://www.kb.cert.org/vuls/id/722753"
|
|
},
|
|
{
|
|
"name" : "18374",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/18374"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-2329",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/2329"
|
|
},
|
|
{
|
|
"name" : "26433",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26433"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:1483",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1483"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:1585",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1585"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:1712",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1712"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:1776",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1776"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:1787",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1787"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:2018",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2018"
|
|
},
|
|
{
|
|
"name" : "1016290",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016290"
|
|
},
|
|
{
|
|
"name" : "20639",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/20639"
|
|
},
|
|
{
|
|
"name" : "win-tcp-ip-driver-bo(26834)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26834"
|
|
}
|
|
]
|
|
}
|
|
}
|