143 lines
4.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-0051",
"sourceIdentifier": "security@debian.org",
"published": "2006-04-05T10:04:00.000",
"lastModified": "2018-10-19T15:42:17.463",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in playlistimport.cpp in Kaffeine Player 0.4.2 through 0.7.1 allows user-assisted attackers to execute arbitrary code via long HTTP request headers when Kaffeine is \"fetching remote playlists\", which triggers the overflow in the http_peek function."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en playlistimport.cpp en Kaffein Player 0.4.2 a 0.7.1 permite a atacantes con implicaci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante peticiones HTTP largas cuando Kaffeine est\u00e1 \"obteniendo listas de reproducci\u00f3n remotas\", lo que que dispara un desbordamiento de b\u00fafer en la funci\u00f3n http_peek.\r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaffeine:kaffeine_player:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "789E99F5-9047-4B97-9F5D-0A83A5B2C264"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaffeine:kaffeine_player:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6AEDC59-1392-45A6-A498-07061345ED1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaffeine:kaffeine_player:0.4.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "650E1BFF-C301-43FA-B6A0-FF14CFBC6E07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaffeine:kaffeine_player:0.5_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D173DD-913A-4A32-B687-B4E2F7BBEB32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaffeine:kaffeine_player:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79CBD359-6818-444C-A0DD-212B21832640"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1015863",
"source": "security@debian.org"
},
{
"url": "http://www.debian.org/security/2006/dsa-1023",
"source": "security@debian.org"
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200604-04.xml",
"source": "security@debian.org"
},
{
"url": "http://www.kde.org/info/security/advisory-20060404-1.txt",
"source": "security@debian.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:065",
"source": "security@debian.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_08_sr.html",
"source": "security@debian.org"
},
{
"url": "http://www.securityfocus.com/archive/1/430319/100/0/threaded",
"source": "security@debian.org"
},
{
"url": "http://www.securityfocus.com/bid/17372",
"source": "security@debian.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1229",
"source": "security@debian.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25631",
"source": "security@debian.org"
},
{
"url": "https://usn.ubuntu.com/268-1/",
"source": "security@debian.org"
}
]
}