{ "id": "CVE-2009-1436", "sourceIdentifier": "cve@mitre.org", "published": "2009-04-27T18:00:00.313", "lastModified": "2016-11-28T19:07:07.827", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The db interface in libc in FreeBSD 6.3, 6.4, 7.0, 7.1, and 7.2-PRERELEASE does not properly initialize memory for Berkeley DB 1.85 database structures, which allows local users to obtain sensitive information by reading a database file." }, { "lang": "es", "value": "La interfaz de base de datos en libc en FreeBSD 6.3, 6.4, 7.0, 7.1, y 7.2-PRERELEASE no inicializa correctamente la memoria para las estructuras de la base de datos Berkeley DB v1.85, lo cual permite a usuarios locales obtener informaci\u00f3n sensible mediante la lectura de un archivo de base de datos." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "F702C46F-CA02-4FA2-B7D6-C61C2C095679" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:release_p10:*:*:*:*:*:*", "matchCriteriaId": "9A1D9D46-75E4-4742-9CF3-2B063B6B7504" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "A4F7F02A-C845-40BF-8490-510A070000F3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:release_p4:*:*:*:*:*:*", "matchCriteriaId": "8E08DCB9-9064-4DB7-B43A-7B415882EB50" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:stable:*:*:*:*:*:*", "matchCriteriaId": "06FB0EEA-254E-4A1F-99E7-058FCD518E22" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "47E0A416-733A-4616-AE08-150D67FCEA70" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:release-p12:*:*:*:*:*:*", "matchCriteriaId": "0452688A-3E71-4BC9-8942-56ABBC47EA87" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "803EFA9F-B7CB-4511-B1C1-381170CA9A23" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:release-p5:*:*:*:*:*:*", "matchCriteriaId": "C2A31704-E99F-4DBE-ABA4-EC3E566DE6CB" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:7.2:pre-release:*:*:*:*:*:*", "matchCriteriaId": "8B573401-DC6F-4AFE-92F5-D96F785D2107" } ] } ] } ], "references": [ { "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10756", "source": "cve@mitre.org" }, { "url": "http://security.freebsd.org/advisories/FreeBSD-SA-09:07.libc.asc", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/34666", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ] }, { "url": "http://www.securitytracker.com/id?1022113", "source": "cve@mitre.org" } ] }