mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-29 01:31:47 +00:00
63 lines
2.0 KiB
JSON
63 lines
2.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@blackberry.com",
|
|
"DATE_PUBLIC": "2017-11-14T00:00:00",
|
|
"ID": "CVE-2017-3893",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "QNX Software Development Platform (QNX SDP)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "6.6.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "BlackBerry"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In BlackBerry QNX Software Development Platform (SDP) 6.6.0, the default configuration of the QNX SDP system did not in all circumstances prevent attackers from modifying the GOT or PLT tables with buffer overflow attacks."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Flawed vulnerability mitigation"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://support.blackberry.com/kb/articleDetail?articleNumber=000046674",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://support.blackberry.com/kb/articleDetail?articleNumber=000046674"
|
|
}
|
|
]
|
|
}
|
|
} |