2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-3425" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-07-07T00:05:00.000" ,
"lastModified" : "2018-10-18T16:47:27.173" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "FastPatch for (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1, and (b) Novell ZENworks 6.2 SR1 and earlier, does not require authentication for dagent/proxyreg.asp, which allows remote attackers to list, add, or delete PatchLink Distribution Point (PDP) proxy servers via modified (1) List, (2) Proxy, or (3) Delete parameters."
} ,
{
"lang" : "es" ,
"value" : "FastPatch para (a) PatchLink Update Server (PLUS) versiones anteriores a 6.1 P1 y 6.2.x versiones anteriores a 6.2 SR1 P1, y (b) Novell ZENworks 6.2 SR y versiones anteiores, no requiere autenticaci\u00f3n para dagent/proxyreg.asp, lo cual permite a atacantes remotos listar, a\u00f1adir, o borrar servidores proxy PatchLink Distribution Point (PDP) a trav\u00e9s de la modificaci\u00f3n de los par\u00e1metros (1) List, (2) Proxy, o (3) Delete."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 7.5
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:lumension:patchlink_update_server:6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "188E8F59-0F22-4C43-8B16-CC5637BF6AFB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:lumension:patchlink_update_server:6.2.0.181:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7704C648-6295-4145-BD2C-77E62DF55196"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:lumension:patchlink_update_server:6.2.0.189:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E8171827-A661-4492-BD53-8DEB2F3759A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:novell:zenworks:*:sr1:*:*:*:*:*:*" ,
"versionEndIncluding" : "6.2" ,
"matchCriteriaId" : "7B1706D5-7465-48C0-8C96-C6798A73B35F"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/20876" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/20878" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securityreason.com/securityalert/1200" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1016405" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/438710/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/18723" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/2595" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/2596" ,
"source" : "cve@mitre.org"
}
]
}