2024-07-14 02:06:08 +00:00

154 lines
4.7 KiB
JSON

{
"id": "CVE-2007-0475",
"sourceIdentifier": "security@ubuntu.com",
"published": "2007-02-03T23:28:00.000",
"lastModified": "2011-03-08T02:49:53.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in utilities/smb4k_*.cpp in Smb4K before 0.8.0 allow local users, when present on the Smb4K sudoers list, to gain privileges via unspecified vectors related to the args variable and unspecified other variables, in conjunction with the sudo configuration."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer basado en pila en utilities/smb4k_*.cpp en Smb4K anterior a 0.8.0 permite a un usuario local , cuando se presenta sobre listas Smb4K sudoers, ganar privilegios a trav\u00e9s de vectores no especificados relacionada con la variable args y otras variables no especificadas, en conjunci\u00f3n con la configuraci\u00f3n sudo."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smb4k:smb4k:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ADAA1F65-4E7C-4D07-84C5-E104D6B680A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smb4k:smb4k:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "117FD513-0BA4-4B76-B865-7DCD2D8C3CC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smb4k:smb4k:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC98527-69EE-425C-B563-320F5A731FB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smb4k:smb4k:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "28CDB015-89C9-4086-B29F-444C115C050E"
}
]
}
]
}
],
"references": [
{
"url": "http://developer.berlios.de/bugs/?func=detailbug&bug_id=9631&group_id=769",
"source": "security@ubuntu.com"
},
{
"url": "http://developer.berlios.de/project/shownotes.php?release_id=11706",
"source": "security@ubuntu.com"
},
{
"url": "http://developer.berlios.de/project/shownotes.php?release_id=11902",
"source": "security@ubuntu.com"
},
{
"url": "http://developer.berlios.de/project/shownotes.php?release_id=9777",
"source": "security@ubuntu.com"
},
{
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0015.html",
"source": "security@ubuntu.com"
},
{
"url": "http://secunia.com/advisories/23937",
"source": "security@ubuntu.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/23984",
"source": "security@ubuntu.com"
},
{
"url": "http://secunia.com/advisories/24111",
"source": "security@ubuntu.com"
},
{
"url": "http://secunia.com/advisories/24469",
"source": "security@ubuntu.com"
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-09.xml",
"source": "security@ubuntu.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:042",
"source": "security@ubuntu.com"
},
{
"url": "http://www.securityfocus.com/bid/22299",
"source": "security@ubuntu.com"
},
{
"url": "http://www.vupen.com/english/advisories/2007/0393",
"source": "security@ubuntu.com"
},
{
"url": "https://lists.berlios.de/pipermail/smb4k-announce/2006-December/000037.html",
"source": "security@ubuntu.com",
"tags": [
"Patch"
]
}
]
}