René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

130 lines
3.6 KiB
JSON

{
"id": "CVE-2017-5953",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-02-10T07:59:00.263",
"lastModified": "2019-06-11T20:29:00.620",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow."
},
{
"lang": "es",
"value": "vim en versiones anteriores a patch 8.0.0322 no valida adecuadamente los valores para la longitud del \u00e1rbol cuando maneja un archivo spell, lo que puede resultar en un desbordamiento de entero en un sitio de asignaci\u00f3n de memoria y un desbordamiento de b\u00fafer resultante."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.0055",
"matchCriteriaId": "6C46FDA7-FFAC-47FC-844E-327A0F14E824"
}
]
}
]
}
],
"references": [
{
"url": "http://www.debian.org/security/2017/dsa-3786",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/96217",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/vim/vim/commit/399c297aa93afe2c0a39e2a1b3f972aebba44c9d",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://groups.google.com/forum/#!topic/vim_dev/t-3RSdEnrHY",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/201706-26",
"source": "cve@mitre.org"
},
{
"url": "https://usn.ubuntu.com/4016-1/",
"source": "cve@mitre.org"
},
{
"url": "https://usn.ubuntu.com/4309-1/",
"source": "cve@mitre.org"
}
]
}