99 lines
2.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2002-0437",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-07-26T04:00:00.000",
"lastModified": "2008-09-05T20:28:01.523",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Smsd in SMS Server Tools (SMStools) before 1.4.8 allows remote attackers to execute arbitrary commands via shell metacharacters (backquotes) in message text, as described with the term \"string format vulnerability\" by some sources."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_frings:sms_server_tools:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AA8F3D85-2811-4378-A1A6-3DE1AAA7A58D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stefan_frings:sms_server_tools:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5C51E72E-C03B-4601-932E-CD3D49F303EE"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-03/0103.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.isis.de/members/~s.frings/smstools/history.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/8433.php",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/4268",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}