119 lines
3.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-4351",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-31T05:00:00.000",
"lastModified": "2017-07-20T01:29:13.817",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dragonfly:dragonfly:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2",
"matchCriteriaId": "D49632E3-D2DD-4D9A-AE3B-D1A43103DA67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:*:stable:*:*:*:*:*:*",
"versionEndIncluding": "6.0",
"matchCriteriaId": "C95AA435-BA20-4451-9283-2B62E64B6B40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:7.0:current:*:*:*:*:*:*",
"matchCriteriaId": "C4E775BA-6DC1-4006-83A4-D30EA57417FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.15",
"matchCriteriaId": "F7A893C0-1374-4B55-92C9-47CA407B7842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.8",
"matchCriteriaId": "64487B62-3A07-4294-B8A4-445BFAA0FFAA"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html",
"source": "cve@mitre.org"
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041177.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.redteam-pentesting.de/advisories/rt-sa-2005-015.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24037",
"source": "cve@mitre.org"
}
]
}