mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
293 lines
10 KiB
JSON
293 lines
10 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2011-1208",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2011-05-05T02:39:46.090",
|
||
|
"lastModified": "2017-08-17T01:34:00.353",
|
||
|
"vulnStatus": "Modified",
|
||
|
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n'CWE-476: NULL Pointer Dereference'",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "IBM solidDB 4.5.x before 4.5.182, 6.0.x before 6.0.1069, 6.1.x and 6.3.x before 6.3 FP8 (aka 6.3.49), and 6.5.x before 6.5 FP4 (aka 6.5.0.4) does not properly handle the (1) rpc_test_svc_readwrite and (2) rpc_test_svc_done commands, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted command."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "IBM solidDB 4.5.x anteriores a 4.5.182, 6.0.x anteriores a 6.0.1069, 6.1.x y 6.3.x anteriores a 6.3 FP8 (tambi\u00e9n conocido como 6.3.49), y 6.5.x anteriores a 6.5 FP4 (tambi\u00e9n conocido como 6.5.0.4) no maneja apropiadamente los comandos (1) rpc_test_svc_readwrite y (2) rpc_test_svc_done commands, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (resoluci\u00f3n de puntero NULL y ca\u00edda del demonio) a trav\u00e9s de un comando modificado."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 7.8
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 6.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.167:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8A0DA527-397A-47B4-AB5A-9BBC5A7DAA28"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.168:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "17BC676A-05D1-4E4E-9D2F-33BCA932F4F0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.169:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B39D6B29-E377-43C9-AC3B-6AF1C6ADFE54"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.173:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "40FBFD43-2751-4D92-B193-D0E2069A139C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.175:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "55CB9B6C-B28E-42DC-982C-4DCA6A556ACF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.176:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E5D6921F-5C5D-476E-B711-165A0A44FBA2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.178:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DACBCB28-150F-44E2-AA56-EB61A67E4805"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.179:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "76E0EDB9-23C2-4890-A091-BC44D9A62596"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.180:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "039ED8A6-F80B-46DD-B591-7D6EBBE14CB4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:4.5.181:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CEF0142B-5DCE-4300-8137-0A1990D2AA41"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1060:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "52BFE67B-53D1-4D07-A90D-8103C0C06BCE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1061:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1BAF8235-C7C6-4CBD-89AF-636ADD9F2C51"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1064:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "314B1005-9DEA-4F8C-9527-5F6A511A2B66"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1065:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3E76225E-A7C1-4E52-B2C9-B3D491B2B1DA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1066:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7D7CFB62-6B88-4A1E-8346-7F7BC8A6B3D9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1067:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C53D246D-826F-42D4-887B-F05BFB5DD1B2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.0.1068:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1480DA44-FF29-48C0-8F20-144F7F6927BB"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.1.18:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8C470235-C021-4BFD-B8A8-7A550D6F6FA3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.1.20:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F979E6DD-CFDE-4A16-AC59-A2738A00749C"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.33:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6CC69E56-801F-4498-8284-A5E3542BE533"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.37:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B04C078E-F68C-4C01-90B7-E24BA1279402"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.38:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5441322D-6072-4A61-852B-01E59BBD6F93"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.39:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FA69EEDE-CEA5-4AA0-9DEF-4651DE01D9C6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.40:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C63BFFB0-4BFF-4243-AABB-89F1048BDBDF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.44:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C2C3E73F-71CA-4DD8-B9A2-B20E3FDD6109"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.47:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "653AFFD4-B925-4FE1-8484-FB95FBBDE571"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.3.48:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "27E00281-B911-460F-8CE3-CD2E6BBA9D19"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1C7CD010-0CF0-4111-A056-40C134367809"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "36D87E5B-D3F5-4DE1-9AEE-EBC91E18D729"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5CBF08E2-20E5-4042-A782-4FE89823C33B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:soliddb:6.5.0.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "59C7C86D-30BE-4BF0-A006-CB2FB3D674B7"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://securitytracker.com/id?1025451",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg21496106",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/47584",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.vupen.com/english/advisories/2011/1117",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-142/",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67019",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|