145 lines
4.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2007-1680",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-06T01:19:00.000",
"lastModified": "2018-10-16T16:40:30.503",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the createAndJoinConference function in the AudioConf ActiveX control (yacscom.dll) in Yahoo! Messenger before 20070313 allows remote attackers to execute arbitrary code via long (1) socksHostname and (2) hostname properties."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n createAndJoinConference en el control ActiveX AudioConf (yacscom.dll) en Yahoo! Messenger anterior a 20070313 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de las propiedades (1) socksHostname y (2) hostname."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:messenger:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7178A56-42F9-44BC-8742-402480F761FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:messenger:8.0.0.863:*:*:*:*:*:*:*",
"matchCriteriaId": "5D369102-AC28-45D1-A9E7-B6C4F34529C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:messenger:8.0_2005.1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7B4212E3-8338-430F-A9BC-A28D502B8B81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:messenger:8.1.0.209:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9243F4-ADE8-4B7A-A195-EEAD41FF14EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yahoo:messenger:8.1.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "3CAF169E-8466-43EF-A03D-D49256EB2C18"
}
]
}
]
}
],
"references": [
{
"url": "http://messenger.yahoo.com/security_update.php?id=031207",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://securityreason.com/securityalert/2523",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/388377",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/archive/1/464607/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/23291",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1017867",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1219",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-012.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33408",
"source": "cve@mitre.org"
}
]
}