mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
123 lines
3.6 KiB
JSON
123 lines
3.6 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-5297",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "[mutt-dev] 20061004 security problem with temp files [was Re: mutt_adv_mktemp() ?]",
|
|
"refsource" : "MLIST",
|
|
"url" : "http://marc.info/?l=mutt-dev&m=115999486426292&w=2"
|
|
},
|
|
{
|
|
"name" : "MDKSA-2006:190",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:190"
|
|
},
|
|
{
|
|
"name" : "RHSA-2007:0386",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
|
|
},
|
|
{
|
|
"name" : "2006-0061",
|
|
"refsource" : "TRUSTIX",
|
|
"url" : "http://www.trustix.org/errata/2006/0061/"
|
|
},
|
|
{
|
|
"name" : "USN-373-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://www.ubuntu.com/usn/usn-373-1"
|
|
},
|
|
{
|
|
"name" : "20733",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/20733"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:10601",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10601"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-4176",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/4176"
|
|
},
|
|
{
|
|
"name" : "22613",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22613"
|
|
},
|
|
{
|
|
"name" : "22640",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22640"
|
|
},
|
|
{
|
|
"name" : "22686",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22686"
|
|
},
|
|
{
|
|
"name" : "22685",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22685"
|
|
},
|
|
{
|
|
"name" : "25529",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/25529"
|
|
}
|
|
]
|
|
}
|
|
}
|