René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

182 lines
6.0 KiB
JSON

{
"id": "CVE-2002-1914",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2008-09-05T20:31:50.323",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "dump 0.4 b10 through b29 allows local users to cause a denial of service (execution prevention) by using flock() to lock the /etc/dumpdates file."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b10:*:*:*:*:*:*:*",
"matchCriteriaId": "A4A27597-6E76-44FF-9524-F1DF4100458B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b11:*:*:*:*:*:*:*",
"matchCriteriaId": "92DBC09C-377F-4833-8515-96E631963396"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b12:*:*:*:*:*:*:*",
"matchCriteriaId": "F7787F4F-0DB8-49B5-A915-537378811610"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b13:*:*:*:*:*:*:*",
"matchCriteriaId": "F65D4820-FFB8-4B20-B32E-2C77E72260E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b14:*:*:*:*:*:*:*",
"matchCriteriaId": "AA31FF8A-895F-48A4-BA90-263800079C44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b15:*:*:*:*:*:*:*",
"matchCriteriaId": "EEC0A662-BD59-4C55-BEF1-E1C6B6816513"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b16:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD730C2-0211-4A1A-A6C5-0ABFA972F0B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b17:*:*:*:*:*:*:*",
"matchCriteriaId": "129BC29B-9B54-446B-9FCE-0AAFB078CC50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b18:*:*:*:*:*:*:*",
"matchCriteriaId": "24DF26F4-C017-4063-897A-A4404D6B3E93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b19:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6892AB-82AA-4EC1-B18A-2E223C5B550A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b20:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD9F36C-5234-4570-872B-37C9E5FD5324"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b21:*:*:*:*:*:*:*",
"matchCriteriaId": "724B5FC9-C0F0-4536-82DF-396DD6B59C2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b22:*:*:*:*:*:*:*",
"matchCriteriaId": "1C9DFD81-2796-4D8A-B169-B0872EB057BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b23:*:*:*:*:*:*:*",
"matchCriteriaId": "A7990D91-17FC-4F08-A14E-71257D34606E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b24:*:*:*:*:*:*:*",
"matchCriteriaId": "C6EC47A0-E372-49AD-9EE3-584716ACE2A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b25:*:*:*:*:*:*:*",
"matchCriteriaId": "858BDD4B-5D02-4084-9F96-9992B2B25569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b26:*:*:*:*:*:*:*",
"matchCriteriaId": "790FF2E9-CB24-46FD-8D06-CD11F74ECF72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b27:*:*:*:*:*:*:*",
"matchCriteriaId": "E2187AFB-B862-4205-A074-73756DEB3C3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b28:*:*:*:*:*:*:*",
"matchCriteriaId": "AB504379-0AAC-4C12-9586-5F52E58335FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dump:dump:0.4_b29:*:*:*:*:*:*:*",
"matchCriteriaId": "87B91132-C97C-45AC-9D1D-BD7650A8FA9B"
}
]
}
]
}
],
"references": [
{
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-156.htm",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/9632.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-583.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/5264",
"source": "cve@mitre.org"
}
]
}