2024-12-08 03:06:42 +00:00

236 lines
8.2 KiB
JSON

{
"id": "CVE-2007-1682",
"sourceIdentifier": "cret@cert.org",
"published": "2008-08-27T20:41:00.000",
"lastModified": "2024-11-21T00:28:55.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the FileManager ActiveX control in SAFmgPws.dll in SoftArtisans XFile before 2.4.0 allow remote attackers to execute arbitrary code via unspecified calls to the (1) BuildPath, (2) GetDriveName, (3) DriveExists, or (4) DeleteFile method."
},
{
"lang": "es",
"value": "M\u00faltiples desbordmientos de b\u00fafer basados en pila en el control ActiveX de FileManager en SAFmgPws.dll de SoftArtisans XFile versiones anteriores a 2.4.0 permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de llamadas no especificadas a los m\u00e9todos (1) BuildPath, (2) GetDriveName, (3) DriveExists, o (4) DeleteFile."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.4",
"matchCriteriaId": "BDFD01A6-2CB3-4EF1-A81F-CF472294081C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A349F44E-3A51-4702-BBB3-7D5B622C68C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "57F37B78-F308-4F2C-BEA4-96E91AA05906"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E0FAEA84-407B-4900-9642-60127D617C76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "84A4500E-7D34-4436-8B27-B127C1D08CF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7F04D099-BFA4-4330-8AF3-EC395E436709"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1B58368F-25B3-4FE4-A5C6-00F6C6888F6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE74F9B-2F6E-4445-9A34-A04E622F269E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC26101E-077A-42AD-B82F-C5E19AC7FB97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "710AB2A2-293A-44D8-92EC-26143599BB31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5E00B5-1D19-4C95-9660-5E3B18E871B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E00A5FCF-31B6-4788-B836-34FEA4A5E1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "53C356DC-5C96-4F8D-83AD-3142E87F88B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E203841-ACD0-4B16-93BC-F650CB6F7853"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "92F3C27D-9BF4-4A36-8B0C-B813C367B22B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8557F8A0-265D-4FEA-9982-9E19EE36CF47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "28350273-2166-474C-AD1F-5591AD644F8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6EC8D73-E71A-4988-A687-10C9AB6EFC83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3134EF9B-D4D6-4F9A-8E63-3AE20105BF54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB5E60A-8DEB-408A-B0BB-404BF2D6AB16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6D143F22-E10F-4548-80CE-79547366A670"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F61EA55C-4DC4-4D7E-8B95-B331DC510A2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6F31FDCD-EC0D-4F49-8032-C062A9FB7E3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softartisans:xfile:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D7D43259-8042-45A4-AF36-B1576FACBAFD"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/31615",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://support.softartisans.com/Support-114.aspx",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/914785",
"source": "cret@cert.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/30826",
"source": "cret@cert.org"
},
{
"url": "http://secunia.com/advisories/31615",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://support.softartisans.com/Support-114.aspx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/914785",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/30826",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}