123 lines
3.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2015-2094",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-03-09T14:59:12.497",
"lastModified": "2016-11-30T03:01:03.410",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the WESPPlayback.WESPPlaybackCtrl.1 control in WebGate WinRDS allows remote attackers to execute arbitrary code via unspecified vectors to the (1) PrintSiteImage, (2) PlaySiteAllChannel, (3) StopSiteAllChannel, or (4) SaveSiteImage function."
},
{
"lang": "es",
"value": "Desbordamiento de buffer basado en pila en el control WESPPlayback.WESPPlaybackCtrl.1 en WebGate WinRDS permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados en la funci\u00f3n (1) PrintSiteImage, (2) PlaySiteAllChannel, (3) StopSiteAllChannel, o (4) SaveSiteImage."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webgateinc:winrds:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60114F15-FF08-4351-9032-DE07B344DCE0"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.osvdb.org/118905",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/118906",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/118907",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/118908",
"source": "cve@mitre.org"
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.securityfocus.com/bid/72841",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-071/",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-072/",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-073/",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-074/",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/36517/",
"source": "cve@mitre.org"
}
]
}