mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
132 lines
4.3 KiB
JSON
132 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2006-5461",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "22932",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/22932"
|
|
},
|
|
{
|
|
"name": "23042",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/23042"
|
|
},
|
|
{
|
|
"name": "SUSE-SR:2006:026",
|
|
"refsource": "SUSE",
|
|
"url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html"
|
|
},
|
|
{
|
|
"name": "22852",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/22852"
|
|
},
|
|
{
|
|
"name": "USN-380-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/380-1/"
|
|
},
|
|
{
|
|
"name": "ADV-2006-4474",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/4474"
|
|
},
|
|
{
|
|
"name": "23020",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/23020"
|
|
},
|
|
{
|
|
"name": "22807",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/22807"
|
|
},
|
|
{
|
|
"name": "http://avahi.org/milestone/Avahi%200.6.15",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://avahi.org/milestone/Avahi%200.6.15"
|
|
},
|
|
{
|
|
"name": "1017257",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1017257"
|
|
},
|
|
{
|
|
"name": "[avahi-tickets] 20061106 [Avahi] #69: Avahi needs to check the originating process of netlink messages",
|
|
"refsource": "MLIST",
|
|
"url": "https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html"
|
|
},
|
|
{
|
|
"name": "MDKSA-2006:215",
|
|
"refsource": "MANDRIVA",
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:215"
|
|
},
|
|
{
|
|
"name": "avahi-netlink-security-bypass(30207)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30207"
|
|
},
|
|
{
|
|
"name": "GLSA-200611-13",
|
|
"refsource": "GENTOO",
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml"
|
|
},
|
|
{
|
|
"name": "21016",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/21016"
|
|
}
|
|
]
|
|
}
|
|
} |