mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
173 lines
6.0 KiB
JSON
173 lines
6.0 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2008-3247",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2008-07-24T15:41:00.000",
|
||
|
"lastModified": "2017-08-08T01:31:42.637",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "The LDT implementation in the Linux kernel 2.6.25.x before 2.6.25.11 on x86_64 platforms uses an incorrect size for ldt_desc, which allows local users to cause a denial of service (system crash) or possibly gain privileges via unspecified vectors."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "La implementaci\u00f3n LDT en el kernel de Linux versiones 2.6.25.x anteriores a 2.6.25.11 en plataformas x86_64 utiliza un tama\u00f1o incorrecto para ldt_desc, lo que permite a los usuarios locales causar una denegaci\u00f3n de servicio (bloqueo del sistema) o posiblemente alcanzar privilegios por medio de vectores no especificados."
|
||
|
}
|
||
|
],
|
||
|
"vendorComments": [
|
||
|
{
|
||
|
"organization": "Red Hat",
|
||
|
"comment": "Not vulnerable. This issue did not affect the versions of the Linux kernel as shipped\nwith Red Hat Enterprise Linux 2.1, 3, 4, 5 or Red Hat Enterprise MRG.",
|
||
|
"lastModified": "2008-07-30T00:00:00"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
|
"accessVector": "LOCAL",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "COMPLETE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 7.2
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 10.0,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-119"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4F7C4DFF-616C-497D-9BAB-67C2E21BC21D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E6EBBFE8-2332-45CE-93F8-6815C2AE5D17"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "388414A1-C9B4-41BA-AD35-6501A463A095"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FDBA01DD-C129-48F1-800B-838418F4A4A4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "185F1EF8-04EB-43ED-B909-8BDF60F23E76"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3483FAFA-353C-498F-AF68-8F5B84A0F30D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6B11A9E1-9D90-46DC-81B5-17A137205AB3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "07EEC559-9240-46BE-9057-0F17D1F61F99"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BBBC127F-D67E-43FE-BCFE-606C200084F4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*",
|
||
|
"matchCriteriaId": "42B18945-EE09-4E6B-8C11-E382E5F8F850"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=74454a6a286bfce4bb23d89bd465f856fa6a6e19",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Patch"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.11",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/30351",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securitytracker.com/id?1020544",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43979",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|