mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
122 lines
4.3 KiB
JSON
122 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-4459",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Heap-based buffer overflow in the NAT networking components vmnat.exe and vmnet-natd in VMWare Workstation 5.5, GSX Server 3.2, ACE 1.0.1, and Player 1.0 allows remote authenticated attackers, including guests, to execute arbitrary code via crafted (1) EPRT and (2) PORT FTP commands."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "18344",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/18344"
|
|
},
|
|
{
|
|
"name": "282",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/282"
|
|
},
|
|
{
|
|
"name": "ADV-2005-3013",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2005/3013"
|
|
},
|
|
{
|
|
"name": "18162",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/18162"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000"
|
|
},
|
|
{
|
|
"name": "GLSA-200601-04",
|
|
"refsource": "GENTOO",
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-04.xml"
|
|
},
|
|
{
|
|
"name": "15998",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/15998"
|
|
},
|
|
{
|
|
"name": "1015401",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1015401"
|
|
},
|
|
{
|
|
"name": "20051221 [ACSSEC-2005-11-25-0x1] VMWare Workstation 5.5.0 <= build-18007 G SX Server Variants And Others",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040442.html"
|
|
},
|
|
{
|
|
"name": "VU#856689",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/856689"
|
|
},
|
|
{
|
|
"name": "20051221 [Security-Advisories (at) acs-inc (dot) com [email concealed]: [Full-disclosure] [ACSSEC-2005-11-25-0x1] VMWare Workstation 5.5.0 <= build-18007 G SX Server Variants And Others]",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/419997/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "20051221 VMware vulnerability in NAT networking",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/420017/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "289",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/289"
|
|
}
|
|
]
|
|
}
|
|
} |