mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.8 KiB
JSON
87 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2004-2125",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Buffer overflow in blackd.exe for BlackICE PC Protection 3.6 and other versions before 3.6.ccb, with application protection off, allows local users to gain system privileges by modifying the .INI file to contain a long packetLog.fileprefix value."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "blackice-blackdexe-bo(14965)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14965"
|
|
},
|
|
{
|
|
"name": "9514",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/9514"
|
|
},
|
|
{
|
|
"name": "3740",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/3740"
|
|
},
|
|
{
|
|
"name": "20040128 SRT2004-01-17-0227 - BlackICE allows local users to become SYSTEM",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://marc.info/?l=bugtraq&m=107530966524193&w=2"
|
|
},
|
|
{
|
|
"name": "[ISSForum] 20040128 Third party BlackICE advisory",
|
|
"refsource": "MLIST",
|
|
"url": "http://archives.neohapsis.com/archives/iss/2004-q1/0157.html"
|
|
},
|
|
{
|
|
"name": "10739",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/10739"
|
|
}
|
|
]
|
|
}
|
|
} |