mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
250 lines
10 KiB
JSON
250 lines
10 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2010-3872",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Stack-based Buffer Overflow",
|
|
"cweId": "CWE-121"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "mod_fcgid",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"version": "2.3.6",
|
|
"status": "unaffected"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"vendor_name": "Red Hat",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Red Hat Enterprise Linux 7",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Red Hat Enterprise Linux 8",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Red Hat Enterprise Linux 9",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"vendor_name": "Fedora",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Fedora",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/69275",
|
|
"refsource": "MISC",
|
|
"name": "http://osvdb.org/69275"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42288",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42288"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42302",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42302"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42815",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42815"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2010/dsa-2140",
|
|
"refsource": "MISC",
|
|
"name": "http://www.debian.org/security/2010/dsa-2140"
|
|
},
|
|
{
|
|
"url": "http://www.gossamer-threads.com/lists/apache/announce/391406",
|
|
"refsource": "MISC",
|
|
"name": "http://www.gossamer-threads.com/lists/apache/announce/391406"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/44900",
|
|
"refsource": "MISC",
|
|
"name": "http://www.securityfocus.com/bid/44900"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2010/2997",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2010/2997"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2010/2998",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2010/2998"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0031",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2011/0031"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/security/cve/CVE-2010-3872",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/security/cve/CVE-2010-3872"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248172",
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2248172"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63303",
|
|
"refsource": "MISC",
|
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63303"
|
|
},
|
|
{
|
|
"url": "https://github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2"
|
|
},
|
|
{
|
|
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=49406",
|
|
"refsource": "MISC",
|
|
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=49406"
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |