mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
176 lines
5.8 KiB
JSON
176 lines
5.8 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2006-4574",
|
||
|
"sourceIdentifier": "secalert@redhat.com",
|
||
|
"published": "2006-10-28T00:07:00.000",
|
||
|
"lastModified": "2018-10-17T21:38:07.510",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Error por un paso en el disector MIME Multipart en Wireshark (anteriormente Ethereal) desde la versi\u00f3n 0.10.1 hasta la 0.99.3 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (cierre inesperado) mediante determinados vectores que desencadenan un error de aserci\u00f3n relacionado con valores de longitud inesperados."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 5.0
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9053B950-143E-4941-9C58-A57D9F1FF78D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8FD279A0-5BA7-4D86-B975-2E76B4B2D85B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "41535173-00D3-4E52-9441-D7ED44BE9B05"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "589FBD3D-FFE4-4BB3-B5F9-7FF949212AE4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BD4F19A6-98D5-4B6A-8AF0-D88561D50296"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B6D5E65C-08BF-480D-A7BE-1876E9AC93E0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "503E7F73-0E2A-442C-9B76-679A2AD03052"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E3C422E5-3252-48C2-B4FF-E32AA5463D97"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "31C43A78-E578-4B1C-8E33-24529E973E30"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A0D56DA6-3EB2-4074-8C43-A5FD93B1555B"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://securitytracker.com/id?1017129",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:195",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.novell.com/linux/security/advisories/2006_65_ethereal.html",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0726.html",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/450307/100/0/threaded",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/20762",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.us.debian.org/security/2006/dsa-1201",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.vupen.com/english/advisories/2006/4220",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.wireshark.org/security/wnpa-sec-2006-03.html",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29844",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://issues.rpath.com/browse/RPL-746",
|
||
|
"source": "secalert@redhat.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740",
|
||
|
"source": "secalert@redhat.com"
|
||
|
}
|
||
|
]
|
||
|
}
|