mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
168 lines
6.0 KiB
JSON
168 lines
6.0 KiB
JSON
{
|
|
"id": "CVE-2007-0315",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-01-18T00:28:00.000",
|
|
"lastModified": "2017-07-29T01:30:07.173",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"evaluatorSolution": "Failed exploit attempts may result in a application level denial-of-service condition.",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples desbordamientos de b\u00fafer en FileZilla versiones anteriores a 2.2.30a, permiten a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n) por medio de vectores no especificados relacionados con (1) el archivo Options.cpp cuando se almacenan configuraciones en el registro, y (2) la cola de transferencia (QueueCtrl.cpp). NOTA: algunos de estos detalles se obtienen de informaci\u00f3n de terceros."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.2.30",
|
|
"matchCriteriaId": "C67196B6-10FD-4A50-93FD-804704AE9980"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E2B2E7B-7382-435A-927A-C741807D26F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CAFFB48F-EA66-41BE-BC27-20246EA1F620"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58C8F086-2040-4866-9010-990D2D1548CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3AC390AF-5CEB-4201-B719-3A1132CBC05C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CAE0841F-4D10-4E4B-A9E5-3A457C42EFDF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1593910D-65A2-4909-83F9-696E3E48BB81"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD809934-E3DA-44FC-B927-11481379801A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A62BFFF0-5048-4010-8F18-FB426F1BAAB3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E54A9FC-D5DB-423E-9512-EDF9529FD8A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5D3C4C2-AEB1-4D83-AE6F-D8F4DE2CD231"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DF8D7E03-48F0-4CF5-AB02-EB57F978B01B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE9CCE2B-A7F8-460D-8415-BBE21AF1DF75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6ECEB364-2691-4189-8504-A70009830759"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/22057",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/0183",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31500",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |