2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2007-0157" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2007-01-09T21:28:00.000" ,
2024-11-22 03:16:05 +00:00
"lastModified" : "2024-11-21T00:25:07.620" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Array index error in the uri_lookup function in the URI parser for neon 0.26.0 to 0.26.2, possibly only on 64-bit platforms, allows remote malicious servers to cause a denial of service (crash) via a URI with non-ASCII characters, which triggers a buffer under-read due to a type conversion error that generates a negative index."
} ,
{
"lang" : "es" ,
"value" : "Error de \u00edndice de array en la funci\u00f3n uri_lookup del int\u00e9rprete de URI para neon 0.26.0 hasta 0.26.2, posiblemente s\u00f3lo en plataformas de 54 bits, permite a servidores remotos maliciosos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante un URI con caracteres no-ASCII, lo que dispara una lectura de b\u00fafer por debajo del l\u00edmite inferior debido a un error de conversi\u00f3n de tipos que genera un \u00edndice negativo."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-11-22 03:16:05 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 03:16:05 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:neon:neon:0.26.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6CA5EF13-02E0-414E-8076-9E8CF8791C61"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:neon:neon:0.26.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2538986-65F3-4E52-BD74-E31728B14A45"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:neon:neon:0.26.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D48115F0-4B06-4C4C-8969-7F0518C46257"
}
]
}
]
}
] ,
"references" : [
{
2023-11-07 21:03:21 +00:00
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi/neon26_0.26.2-3_to_mdx1.diff?bug=404723%3Bmsg=5%3Batt=2" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=404723" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://mailman.webdav.org/pipermail/cadaver/2007-January/001015.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://mailman.webdav.org/pipermail/neon/2007-January/002362.html" ,
"source" : "cve@mitre.org"
} ,
2023-11-07 21:03:21 +00:00
{
"url" : "http://osvdb.org/39247" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/23751" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/23763" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/23984" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:013" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.novell.com/linux/security/advisories/2007_02_sr.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/22035" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/0172" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/0362" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.webdav.org/cadaver/" ,
"source" : "cve@mitre.org"
2024-11-22 03:16:05 +00:00
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi/neon26_0.26.2-3_to_mdx1.diff?bug=404723%3Bmsg=5%3Batt=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=404723" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://mailman.webdav.org/pipermail/cadaver/2007-January/001015.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://mailman.webdav.org/pipermail/neon/2007-January/002362.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://osvdb.org/39247" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/23751" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/23763" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/23984" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:013" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.novell.com/linux/security/advisories/2007_02_sr.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/22035" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/0172" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/0362" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.webdav.org/cadaver/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "Not vulnerable. This issue does not affect the older versions of neon as shipped with Red Hat Enterprise Linux 2.1, 3, and 4. This issue also does not affect the older versions of neon included in the cadaver package." ,
"lastModified" : "2007-01-15T00:00:00"
2023-04-24 12:24:31 +02:00
}
]
}