2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-2208" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-06-25T02:00:00.327" ,
2024-11-22 09:15:19 +00:00
"lastModified" : "2024-11-21T01:04:23.413" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "FreeBSD 6.3, 6.4, 7.1, and 7.2 does not enforce permissions on the SIOCSIFINFO_IN6 IOCTL, which allows local users to modify or disable IPv6 network interfaces, as demonstrated by modifying the MTU."
} ,
{
"lang" : "es" ,
"value" : "FreeBSD v6.3, v6.4, v7.1, y v7.2 no respeta los permisos sobre SIOCSIFINFO_IN6 IOCTL, lo que permite a usuarios locales modificar o deshabilitar interfaces de red IPv6, como se ha desmostrado modificando el MTU."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:P" ,
2024-11-22 09:15:19 +00:00
"baseScore" : 3.6 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 09:15:19 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F702C46F-CA02-4FA2-B7D6-C61C2C095679"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.3:release_p10:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A1D9D46-75E4-4742-9CF3-2B063B6B7504"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.3:release_p11:*:*:*:*:*:*" ,
"matchCriteriaId" : "14C10691-0BAB-45EF-9050-BED05B70660F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.3:release_p6:*:*:*:*:*:*" ,
"matchCriteriaId" : "311F47DD-E224-4E10-A767-79B2B4B33023"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.3:release_p8:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2D1E2AB-5AA2-403F-B547-44747B50C970"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.3:release_p9:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9738883-5FB9-4261-9388-D01660ED64DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.3_releng:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72C2BE9D-91E1-48E9-9326-39CF583A57E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A4F7F02A-C845-40BF-8490-510A070000F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.4:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "53D1AD5E-4007-4AFA-A18B-69D1AC055C00"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.4:release_p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "06BFEE54-DBF3-4546-AE57-2C25FC9F0F04"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.4:release_p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE1FC1A8-E499-45A0-B89A-5BFA24727DBD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.4:release_p4:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E08DCB9-9064-4DB7-B43A-7B415882EB50"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.4:release_p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4A5E6FF-617E-4173-A948-F3728454A012"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.4:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "06FB0EEA-254E-4A1F-99E7-058FCD518E22"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "803EFA9F-B7CB-4511-B1C1-381170CA9A23"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:pre-release:*:*:*:*:*:*" ,
"matchCriteriaId" : "14D72C9B-EEB0-4605-BEA2-F77092129245"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "52DBF406-9C77-4DDA-AB7D-40FAE40023D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:release-p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "20A31C9A-A928-4C9B-BB49-0E53227746DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:release-p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "99FB7443-F942-402A-9104-64677EAF014E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:release-p4:*:*:*:*:*:*" ,
"matchCriteriaId" : "305A4C3D-C63D-4D1F-80FF-549182A0D9B5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:release-p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "C2A31704-E99F-4DBE-ABA4-EC3E566DE6CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:release-p6:*:*:*:*:*:*" ,
"matchCriteriaId" : "E634CDF4-F77B-4917-A452-907A771B5B0D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.1:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9A75104-5A3E-485E-B4EC-0873C942731C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F948527C-A01E-4315-80B6-47FACE18A34F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.2:pre-release:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B573401-DC6F-4AFE-92F5-D96F785D2107"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:7.2:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "60D40129-108B-421B-9990-6C6F381C96AD"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/35410" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://security.FreeBSD.org/advisories/FreeBSD-SA-09:10.ipv6.asc" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/35285" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securitytracker.com/id?1022367" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51044" ,
"source" : "cve@mitre.org"
2024-11-22 09:15:19 +00:00
} ,
{
"url" : "http://secunia.com/advisories/35410" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://security.FreeBSD.org/advisories/FreeBSD-SA-09:10.ipv6.asc" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/35285" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securitytracker.com/id?1022367" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51044" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}