mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
103 lines
4.0 KiB
JSON
103 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2007-4035",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-07-27T22:30:00.000",
|
|
"lastModified": "2018-10-15T21:33:02.807",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "** DISPUTED ** Guidance Software EnCase does not properly handle (1) certain malformed MBR partition tables with many entries, which allows remote attackers to prevent logical collection of a disk image; (2) NTFS filesystems with directory loops, which allows remote attackers to prevent examination of certain directory contents; and (3) certain other malformed NTFS filesystems, which allows remote attackers to prevent examination of corrupted records. NOTE: the vendor disputes the significance of these issues, because physical collection can be used instead, because the vendor believes that relevant attackers typically do not corrupt an MBR or a filesystem, and because detection of a loop is valuable on its own."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "** EN DISPUTA ** Guidance Software EnCase no maneja correctamente (1) ciertas tablas de particiones MBR mal formadas con muchas entradas, lo que permite a atacantes remotos evitar la recopilaci\u00f3n l\u00f3gica de una imagen del disco; (2) sistemas de archivos NTFS con bucles de directorio, lo que permite a atacantes remotos evitar el examen de ciertos contenidos de directorios y (3) otros ciertos sistemas de archivos NTFS mal formados, lo que permite a atacantes remotos evitar el examen de archivos corruptos. NOTA: el fabricante impugna la importancia de estos problemas, porque se puede usar la recopilaci\u00f3n f\u00edsica en vez de lo anterior, ya que el fabricante cree que los atacantes pertinentes normalmente no corrompen un MBR o un sistema de archivos y porque la detecci\u00f3n de un bucle is \u00fatil por s\u00ed misma."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:guidance_software:encase:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "390A2951-B37B-4CCD-BFA2-49AC404DB53C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.blackhat.com/html/bh-usa-07/bh-usa-07-speakers.html#Palmer",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Paper.v1_1.BH2007.pdf",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/474727/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/474750/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/474809/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/475335/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/25100",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |