2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-1457" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2010-05-12T11:46:51.047" ,
"lastModified" : "2010-05-12T11:46:51.047" ,
"vulnStatus" : "Analyzed" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 allows local users to read arbitrary files via a (1) -c or (2) -a option, which prints file contents in an error message."
} ,
{
"lang" : "es" ,
"value" : "Tools/gdomap.c en gdomap de GNUstep Base anterior a v1.20.0 permite a usuarios locales leer ficheros arbitrarios a trav\u00e9s de la opci\u00f3n (1)-c o (2)-a, imprimiendo los contenidos del fichero en un mensaje de error."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:N/A:N" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.9
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-200"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.19.3" ,
"matchCriteriaId" : "0D419B9A-A8AB-402E-8CC6-CF7475712052"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.11.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "86EAF8AB-DF06-4E78-864A-AABB609E16A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D19B51A-B4E1-4918-B66C-CAADBDCC7E1E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FDED7FD1-D215-4A7B-8AB5-5AE0768F4D70"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.14.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE32DE90-EF3F-4BB5-9F88-A9AB81B0C9EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.15.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E7A123E2-1929-42F2-89A4-B7F72ED1A9FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.15.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FAC64F8D-670C-4148-A75A-BFE612CA2A33"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.15.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A90755C5-7070-4143-834F-FACDFFE4668E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.15.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B5EE26C-539D-4B5D-9781-1A45C74A1F35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.17.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1DB4A798-E17F-4269-91CC-DD41448A12C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.18.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C79ABFE1-9A5E-4A20-B977-D203854BBC0D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.19.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5AFAEDC-5517-4B20-B461-A841183246C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.19.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD0DF768-8DDB-44AB-A17D-D095A11BDCC6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnustep:gnustep_base:1.19.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45AB091A-B185-4404-B022-A57E7780FE02"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://savannah.gnu.org/bugs/?29755" ,
"source" : "secalert@redhat.com"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/39746" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://thread.gmane.org/gmane.comp.lib.gnustep.bugs/12336" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2010/05/07/6" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/40005" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://bugs.launchpad.net/ubuntu/+source/gnustep-base/+bug/573108" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Exploit"
]
}
]
}