2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-2658" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-08-04T16:30:00.420" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:05:25.280" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Directory traversal vulnerability in ZNC before 0.072 allows remote attackers to overwrite arbitrary files via a crafted DCC SEND request."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de salto de directorio en ZNC anterior a v0.072 permite a atacantes remotos sobrescribir ficheros de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n DCC SEND manipulada."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : true ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-22"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.044:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C012D55-9039-4D68-9CA0-5624ADEF583F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.045:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C185E34-735D-4839-8C05-B46CE7028765"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.047:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "60AEE9F9-78B7-40B4-B28A-1B8F068CA953"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.052:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AECFB9F-9630-438F-9BE4-E4A44A5023FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.054:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA564C01-2757-479C-9E33-2D7F0890C61C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.056:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BFE27D3-487B-41A2-A6CE-AA36E07506BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.058:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "13E7CC41-1923-4295-8AFC-8D295FDD9C5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.060:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C2127D9-936F-4E71-BB78-02DE61FF44C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.062:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "89151E35-63D2-440E-AD2F-A2BAECA6884B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.064:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "952BC3B5-4D07-4C61-B3FE-650FBC699B8F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.066:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9983141A-3B1F-41EE-809A-0F435EC067C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.068:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6A505A45-4404-4E0E-97AD-69D9C5D280DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:znc:znc:0.070:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8AB8B51F-4FD7-463B-9E8B-6846E7E690A5"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://en.znc.in/w/index.php?title=ZNC&oldid=3209#WARNING" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://en.znc.in/wiki/ChangeLog/0.072" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/35916" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.debian.org/security/2009/dsa-1848" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2009/07/21/5" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1570" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00965.html" ,
"source" : "cve@mitre.org"
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://en.znc.in/w/index.php?title=ZNC&oldid=3209#WARNING" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://en.znc.in/wiki/ChangeLog/0.072" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35916" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2009/dsa-1848" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2009/07/21/5" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1570" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00965.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}