René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

136 lines
3.5 KiB
JSON

{
"id": "CVE-2005-3567",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-11-16T07:42:00.000",
"lastModified": "2017-07-11T01:33:14.250",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.5,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "35E1DF05-5CE8-4782-9F65-B01464985908"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1EF905E9-DDA5-4369-AC6C-FD6E2573E667"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1015171",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www-1.ibm.com/support/docview.wss?rs=767&context=SSVJJU&dc=D400&uid=swg24010819&loc=en_US&cs=UTF-8&lang=en",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21222159",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IO02697&apar=only",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IO02714&apar=only",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/194753",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/15367",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2005/2356",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22989",
"source": "cve@mitre.org"
}
]
}