cvelist/2003/1xxx/CVE-2003-1376.json

78 lines
2.1 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2003-1376",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "WinZip 8.0 uses weak random number generation for password protected ZIP files, which allows local users to brute force the encryption keys and extract the data from the zip file by guessing the state of the stream coder."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20030208 Yet another plaintext attack to ZIP encryption scheme.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/311059"
},
{
"name" : "3265",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3265"
},
{
"name" : "winzip-pkzip-weak-encryption(11296)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11296"
},
{
"name" : "6805",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6805"
}
]
}
}