mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
127 lines
4.3 KiB
JSON
127 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2010-1938",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Off-by-one error in the __opiereadrec function in readrec.c in libopie in OPIE 2.4.1-test1 and earlier, as used on FreeBSD 6.4 through 8.1-PRERELEASE and other platforms, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long username, as demonstrated by a long USER command to the FreeBSD 8.0 ftpd."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://blog.pi3.com.pl/?p=111",
|
|
"refsource": "MISC",
|
|
"url": "http://blog.pi3.com.pl/?p=111"
|
|
},
|
|
{
|
|
"name": "7450",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/7450"
|
|
},
|
|
{
|
|
"name": "40403",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/40403"
|
|
},
|
|
{
|
|
"name": "http://site.pi3.com.pl/adv/libopie-adv.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://site.pi3.com.pl/adv/libopie-adv.txt"
|
|
},
|
|
{
|
|
"name": "1024040",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1024040"
|
|
},
|
|
{
|
|
"name": "DSA-2281",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2011/dsa-2281"
|
|
},
|
|
{
|
|
"name": "FreeBSD-SA-10:05",
|
|
"refsource": "FREEBSD",
|
|
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-10:05.opie.asc"
|
|
},
|
|
{
|
|
"name": "39966",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/39966"
|
|
},
|
|
{
|
|
"name": "12762",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "http://www.exploit-db.com/exploits/12762"
|
|
},
|
|
{
|
|
"name": "20100527 libopie __readrec() off-by one (FreeBSD ftpd remote PoC)",
|
|
"refsource": "SREASONRES",
|
|
"url": "http://securityreason.com/achievement_securityalert/87"
|
|
},
|
|
{
|
|
"name": "1025709",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1025709"
|
|
},
|
|
{
|
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584932",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584932"
|
|
},
|
|
{
|
|
"name": "39963",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/39963"
|
|
},
|
|
{
|
|
"name": "45136",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/45136"
|
|
}
|
|
]
|
|
}
|
|
} |