mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
77 lines
2.4 KiB
JSON
77 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-4438",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Heap-based buffer overflow in SpIDer for Dr.Web Scanner for Linux 4.33, and possibly earlier versions, allows remote attackers to execute arbitrary code via an LHA archive with an extended header that contains a long directory name."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20119",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/20119"
|
|
},
|
|
{
|
|
"name": "22019",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/22019"
|
|
},
|
|
{
|
|
"name": "ADV-2006-3719",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/3719"
|
|
},
|
|
{
|
|
"name": "20060420 Dr.Web 4.33 antivirus LHA long directory name heap overflow",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049552.html"
|
|
}
|
|
]
|
|
}
|
|
} |