89 lines
2.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-1379",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-03-24T11:02:00.000",
"lastModified": "2011-03-08T02:32:57.017",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Trend Micro PC-cillin Internet Security 2006 14.00.1485 and 14.10.0.1023, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying executable programs such as (1) tmntsrv.exe and (2) tmproxy.exe."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trend_micro:pc-cillin_2006:*:*:*:*:*:*:*:*",
"versionEndIncluding": "14.10.0.1023",
"matchCriteriaId": "DCAAE1D4-5A89-41A7-BC03-9D0708A06873"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trend_micro:pc-cillin_2006:14.00.1485:*:*:*:*:*:*:*",
"matchCriteriaId": "7275738E-9E4F-4A0C-B046-543ADAE6A63F"
}
]
}
]
}
],
"references": [
{
"url": "http://www.secumind.net/content/french/modules/news/article.php?storyid=9&sel_lang=english",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/1042",
"source": "cve@mitre.org"
}
]
}