mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
165 lines
5.7 KiB
JSON
165 lines
5.7 KiB
JSON
{
|
|
"id": "CVE-2003-0070",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-03-03T05:00:00.000",
|
|
"lastModified": "2016-10-18T02:29:07.657",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\r\n\r\n'CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')'",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "VTE, as used by default in gnome-terminal terminal emulator 2.2 and as an option in gnome-terminal 2.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El emulador de terminal gnome-terminal permite a atacantes modificar el t\u00edtulo de la ventana mediante cierta secuencia de car\u00e1cter de escape, y a continuaci\u00f3n volver a insertarlo en la l\u00ednea de comandos del terminal del usuario, lo que podr\u00eda permitir al atacante ejecutar comandos arbitrarios."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.11.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0CBB9AD-5118-4484-A265-6DF819C111B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.12.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE63886D-928A-4F30-8547-20B19D406EA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.14.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1BC4612-2ACB-4087-A349-8E26AF1A3BF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.15.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7500A708-B2DB-49A8-823D-5632ECA92205"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.16.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C134DA96-4F89-47EA-9655-9D68FC5D86F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.17.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80AD28D1-5CA8-446A-9D71-7051332DF9AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.20.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1052E372-C3E9-4CF4-80AC-ED116CF37F94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.22.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F3171C1-7888-43FC-A618-221F2B5D1174"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.24.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66A6A608-AD4B-499F-BFE6-AD8DA79BE29F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nalin_dahyabhai:vte:0.25.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "004C85EE-7881-4B03-8946-6E17F0D0A48C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnome:gnome-terminal:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1DF64D68-2E3D-4504-AC40-C73ABE136EE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnome:gnome-terminal:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "592958D8-368B-4A10-90A9-559BD0CBECCD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=104612710031920&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/lists/bugtraq/2003/Mar/0010.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.iss.net/security_center/static/11414.php",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-053.html",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |