2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-0148" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-05-05T17:30:00.233" ,
"lastModified" : "2017-09-29T01:33:39.263" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple buffer overflows in Cscope before 15.7a allow remote attackers to execute arbitrary code via long strings in input such as (1) source-code tokens and (2) pathnames, related to integer overflows in some cases. NOTE: this issue exists because of an incomplete fix for CVE-2004-2541."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples desbordamientos de b\u00fafer en Cscope anterior a versi\u00f3n 15.7a, permiten a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de cadenas largas en entradas como (1) tokens de c\u00f3digo fuente y (2) nombres de ruta, relacionados con desbordamiento de enteros en algunos casos. NOTA: este problema se presenta debido a una correcci\u00f3n incompleta del CVE-2004-2541."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 9.3
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cscope:cscope:13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27476BD2-FC3B-46A1-8810-DB3DB29106C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cscope:cscope:15.0bl2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17C00B4F-D84A-4CF6-B4BF-D0F574CBFD42"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cscope:cscope:15.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78590FBB-C9CE-42B7-83C9-1F5FAD11A2A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cscope:cscope:15.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E821D0F7-D928-4C2F-89DE-7B46968A2970"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cscope:cscope:15.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0837A120-86AE-4ABB-AB38-F3D573C5064B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cscope:cscope:15.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2F1D020-6884-4D6D-AB04-88119CB53F9E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cscope:cscope:15.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16BA0384-4466-467D-80E4-44DAE2B70038"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cscope:cscope:15.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10D85508-318A-43F5-B6C8-E090FB678DAC"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/34978" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35074" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35213" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35214" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35462" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://security.gentoo.org/glsa/glsa-200905-02.xml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://sourceforge.net/forum/forum.php?forum_id=947983" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://sourceforge.net/mailarchive/forum.php?thread_name=E1LsGx3-00015K-TN%40ddv4jf1.ch3.sourceforge.com&forum_name=cscope-cvs" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://sourceforge.net/project/shownotes.php?group_id=4664&release_id=679527" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://support.apple.com/kb/HT3549" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2009/dsa-1806" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2009/05/06/9" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1101.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1102.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/34805" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securitytracker.com/id?1022218" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1238" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1297" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=490667" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9633" ,
"source" : "cve@mitre.org"
}
]
}