mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
127 lines
3.5 KiB
JSON
127 lines
3.5 KiB
JSON
{
|
|
"id": "CVE-2005-0739",
|
|
"sourceIdentifier": "security@debian.org",
|
|
"published": "2005-05-02T04:00:00.000",
|
|
"lastModified": "2024-02-14T01:17:43.863",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-189"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ethereal_group:ethereal:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "0.10.9",
|
|
"matchCriteriaId": "08D3F4F1-432B-4AA7-9312-768C0123DB4A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707",
|
|
"source": "security@debian.org",
|
|
"tags": [
|
|
"URL Repurposed"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=111066805726551&w=2",
|
|
"source": "security@debian.org"
|
|
},
|
|
{
|
|
"url": "http://security.lss.hr/index.php?page=details&ID=LSS-2005-03-05",
|
|
"source": "security@debian.org"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2005/dsa-718",
|
|
"source": "security@debian.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.ethereal.com/appnotes/enpa-sa-00018.html",
|
|
"source": "security@debian.org",
|
|
"tags": [
|
|
"Patch",
|
|
"URL Repurposed"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200503-16.xml",
|
|
"source": "security@debian.org"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:053",
|
|
"source": "security@debian.org"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html",
|
|
"source": "security@debian.org"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-306.html",
|
|
"source": "security@debian.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/12762",
|
|
"source": "security@debian.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9687",
|
|
"source": "security@debian.org"
|
|
}
|
|
]
|
|
} |