103 lines
2.9 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-2424",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-08-03T04:00:00.000",
"lastModified": "2017-07-11T01:32:50.127",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The management interface for Siemens SANTIS 50 running firmware 4.2.8.0, and possibly other products including Ericsson HN294dp and Dynalink RTA300W, allows remote attackers to access the Telnet port without authentication via certain packets to the web interface that cause the interface to freeze."
},
{
"lang": "es",
"value": "La interfaz de administraci\u00f3n de Siemens SANTIS 50 running firmware 4.2.8.0, y posiblemente otros productos como Ericsson HN294dp y Dynalink RTA300W permite que atacantes remotos accedan al puerto Telnet sin autentificaci\u00f3n mediante ciertos paquetes a la interfaz web (lo que provoca que la interfaz se congele)."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:siemens:santis_50:4.2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "781F6738-836C-468C-97CF-DC3EFB9455B0"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=112230914431638&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/16215",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/18294",
"source": "cve@mitre.org"
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.securenetwork.it/advisories/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/14372",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21552",
"source": "cve@mitre.org"
}
]
}