mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
236 lines
8.5 KiB
JSON
236 lines
8.5 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2006-3961",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2006-08-01T21:04:00.000",
|
||
|
"lastModified": "2018-10-17T21:32:33.143",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Desbordamiento de b\u00fafer en control ActiveX McSubMgr (mcsubmgr.dll) en McAfee Security Center 6.0.23 para Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, y QuickClean permite a atacantes con la intervenci\u00f3n del usuario ejecutar comandos de su elecci\u00f3n a trav\u00e9s de par\u00e1ametros string, los cuales son posteriormente usados en vsprintf."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 6.8
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 6.4,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": true,
|
||
|
"userInteractionRequired": true
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-119"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:antispyware:2005:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B862ADF2-A544-4729-9EE4-D140C58D6AEB"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:antispyware:2006:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5350EE37-53D7-4DFB-84FC-0FA6A7C1C123"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:internet_security_suite:2004:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CB0A7659-25FF-4E18-B2BA-34F6FD6410F6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:internet_security_suite:2005:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1C22BB62-9790-4D89-B1B4-D5E0F4FFB3C5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:internet_security_suite:2006:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7E69BB96-F48B-43DA-BA7B-530E5148CCC0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:personal_firewall_plus:2004:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1F3E0836-557F-46C8-BBDE-955D3AEBB6B3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:personal_firewall_plus:2005:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5F62AF06-16DD-4C6C-BD48-BFA08629739C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:personal_firewall_plus:2006:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "134C4C4F-92A0-4B89-B06A-4FB8D9513AFE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:privacy_service:2004:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0F945365-B065-44A6-8CEC-2CBCE4DD23C4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:privacy_service:2005:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DB1AC389-8BBF-4784-ABCD-99E379AC6B75"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:privacy_service:2006:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8E03296D-5FC1-450D-BC05-6F6E9A90CF77"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:quickclean:2004:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "931427A2-B69B-4418-8374-854A5F9420DE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:quickclean:2005:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E19A9E38-E637-487A-BC06-F0CA6481E7EB"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:quickclean:2006:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "AE3B1863-DBB3-4458-899B-CEEAD9275B17"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:security_center:4.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DD547C9C-9D50-49ED-8EFE-1DD7484DDED5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:security_center:6.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "210F5447-4FC7-4278-9F2A-C64BBB5A86DD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:security_center:6.0.22:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BECBD40D-ACBD-4E88-B230-ECFE98FD9F5D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:security_center:6.0.23:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A82098C7-30FE-464E-891F-868A0209D9DB"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:spamkiller:5.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0652B16C-7D9A-4743-AB54-6F205CA1E76D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:spamkiller:6.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6CBC8F91-2534-4DAC-BDE3-AE49E19A6A8E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:spamkiller:7.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5B33F2AC-4BBE-4DE0-A61E-378972011BB0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:virusscan:2004:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4D9B7B07-E3EF-4185-927C-CE308829B9A1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:virusscan:2005:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F58D6A2F-AC08-4C1D-9ABF-4D675A1E87AC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:virusscan:2006:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9E96246D-3184-4BBB-8675-9B1CBE0B977C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mcafee:wireless_home_network_security:2006:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3B3DC47F-853B-44B0-BD8B-C2EE4530B333"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://securitytracker.com/id?1016614",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://ts.mcafeehelp.com/faq3.asp?docid=407052",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.eeye.com/html/research/advisories/AD2006807.html",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.eeye.com/html/research/upcoming/20060719.html",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.kb.cert.org/vuls/id/481212",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"US Government Resource"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/442495/100/100/threaded",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/19265",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.vupen.com/english/advisories/2006/3096",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|