137 lines
4.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-4800",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-14T22:07:00.000",
"lastModified": "2018-10-30T16:25:34.370",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in libavcodec in ffmpeg before 0.4.9_p20060530 allow remote attackers to cause a denial of service or possibly execute arbitrary code via multiple unspecified vectors in (1) dtsdec.c, (2) vorbis.c, (3) rm.c, (4) sierravmd.c, (5) smacker.c, (6) tta.c, (7) 4xm.c, (8) alac.c, (9) cook.c, (10) shorten.c, (11) smacker.c, (12) snow.c, and (13) tta.c. NOTE: it is likely that this is a different vulnerability than CVE-2005-4048 and CVE-2006-2802."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de buffer en libavcodec en ffmpeg anterior a 0.4.9_p20060530 permite a un atacante remoto causar denegaci\u00f3n de servicio o la posibilidad de ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de multiples vectores no especificados en (1) dtsdec.c, (2) vorbis.c, (3) rm.c, (4) sierravmd.c, (5) smacker.c, (6) tta.c, (7) 4xm.c, (8) alac.c, (9) cook.c, (10) shorten.c, (11) smacker.c, (12) snow.c, y (13) tta.c. NOTA: es probable que esta sea una vulnerabilidad diferente a la CVE-2005-4048 y CVE-2006-2802."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0AEE1977-E9E0-4BFF-B33B-B083E49E51F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E6979C17-0BC6-47D1-9B73-254D84306A96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "204C7C05-3441-4DB0-8702-D99C8FCB381E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD897CA-4F73-437B-9649-951DD2D37B51"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=133520",
"source": "cve@mitre.org"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200609-09.xml",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:173",
"source": "cve@mitre.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:174",
"source": "cve@mitre.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:175",
"source": "cve@mitre.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:176",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_73_mono.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/20009",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-358-1",
"source": "cve@mitre.org"
},
{
"url": "http://www.us.debian.org/security/2006/dsa-1215",
"source": "cve@mitre.org"
}
]
}