195 lines
6.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-4901",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-22T22:07:00.000",
"lastModified": "2021-04-09T16:21:30.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, and eTrust Audit 1.5 and r8, allows remote attackers to spoof alerts and conduct replay attacks by invoking eTSAPISend.exe with the desired arguments."
},
{
"lang": "es",
"value": "Computer Associates (CA) eTrust Security Command Center 1.0 y r8 hasta SP1 CR2, y eTrust Audit 1.5 y r8, permite a un atacante remoto suplantar alertas y gu\u00edar ataques de repetici\u00f3n a trav\u00e9s de la invocaci\u00f3n de eTSAPISend.exe con los argumentos deseados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_client:1.5:sp2:*:*:*:*:*:*",
"matchCriteriaId": "AADF88C7-8F85-4FA9-82DD-4896404A92C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_client:1.5:sp3:*:*:*:*:*:*",
"matchCriteriaId": "315F1B77-C655-4131-87DA-EBC171FEDEC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_client:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "555B7B8E-8047-4890-810D-DECDFC730BC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:1.5:sp2:*:*:*:*:*:*",
"matchCriteriaId": "209DFBD5-5E38-42A1-945D-4879C5FAFDE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:1.5:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3DDC23AF-EEC3-4DF9-8EC6-A7B094224EDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB1A4631-D677-468C-9A31-DD5C4BBDDF28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:1.5:sp2:*:*:*:*:*:*",
"matchCriteriaId": "25AEF3E6-1113-41A5-9357-96F8374C4A7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:1.5:sp3:*:*:*:*:*:*",
"matchCriteriaId": "2749B665-DA7F-4F6A-9F52-3A4D0A10BAFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AD8658-B2BB-4E60-8EAA-7B491F2D6027"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C363D8B-1022-4C2A-BEDE-34EAB274D9D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:*:*:*:*:*:*:*",
"matchCriteriaId": "BB8C8321-1BE6-476D-910E-6BBDBE683309"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr1:*:*:*:*:*",
"matchCriteriaId": "054689EB-D43E-4C0F-B504-FE615607332A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr2:*:*:*:*:*",
"matchCriteriaId": "40DC453F-12F6-4D51-ADFF-71D2628F3CD8"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1016909",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016910",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/446611/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/446716/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/20139",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3738",
"source": "cve@mitre.org"
},
{
"url": "http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34618",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29107",
"source": "cve@mitre.org"
}
]
}