122 lines
3.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-0739",
"sourceIdentifier": "security@debian.org",
"published": "2005-05-02T04:00:00.000",
"lastModified": "2017-10-11T01:29:59.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.10.9",
"matchCriteriaId": "08D3F4F1-432B-4AA7-9312-768C0123DB4A"
}
]
}
]
}
],
"references": [
{
"url": "http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707",
"source": "security@debian.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=111066805726551&w=2",
"source": "security@debian.org"
},
{
"url": "http://security.lss.hr/index.php?page=details&ID=LSS-2005-03-05",
"source": "security@debian.org"
},
{
"url": "http://www.debian.org/security/2005/dsa-718",
"source": "security@debian.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.ethereal.com/appnotes/enpa-sa-00018.html",
"source": "security@debian.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200503-16.xml",
"source": "security@debian.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:053",
"source": "security@debian.org"
},
{
"url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html",
"source": "security@debian.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-306.html",
"source": "security@debian.org"
},
{
"url": "http://www.securityfocus.com/bid/12762",
"source": "security@debian.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9687",
"source": "security@debian.org"
}
]
}