2024-07-14 02:06:08 +00:00

133 lines
3.6 KiB
JSON

{
"id": "CVE-2007-5756",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-11-14T01:46:00.000",
"lastModified": "2024-02-09T03:13:48.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple array index errors in the bpf_filter_init function in NPF.SYS in WinPcap before 4.0.2, when run in monitor mode (aka Table Management Extensions or TME), and as used in Wireshark and possibly other products, allow local users to gain privileges via crafted IOCTL requests."
},
{
"lang": "es",
"value": "M\u00faltiples errores de \u00edndice de array en la funci\u00f3n bpf_filter_init en NPF.SYS en WinPcap anterior a 4.0.2, cuando funciona en modo monitor (tambi\u00e9n conocido c\u00f3mo Table Management Extensions o TME), y como es utilizado en Wireshark y posiblemente otros productos, permite a usuarios locales ganar privilegios a trav\u00e9s de respuestas IOCTL manipuladas."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:winpcap:winpcap:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.2",
"matchCriteriaId": "4A6E528E-DE46-46F1-B8EA-0D885DA7D9E3"
}
]
}
]
}
],
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=625",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/27676",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/26409",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1018935",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/3835",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.winpcap.org/misc/changelog.htm",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38433",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}