2024-12-08 03:06:42 +00:00

143 lines
4.2 KiB
JSON

{
"id": "CVE-2008-0584",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-05T03:00:00.000",
"lastModified": "2024-11-21T00:42:26.523",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in bos.rte.control in IBM AIX 5.2 and 5.3 allow local users to gain privileges via unspecified vectors related to the (1) swap, (2) swapoff, and (3) swapon programs."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en bos.rte.contro. en IBM AIX 5.2 y 5.3 permiten a usuarios locales conseguir privilegios a trav\u00e9s de vector no especificados relativos a los programas (1)swap, (2) swapoff, y (3) swapon."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 7.2,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17EECCCB-D7D1-439A-9985-8FAE8B44487B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EA8DDF4A-1C5D-4CB1-95B3-69EAE6572507"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/28609",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IY96095",
"source": "cve@mitre.org"
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IY96101",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/27432",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0261",
"source": "cve@mitre.org"
},
{
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4064",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5744",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/28609",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IY96095",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IY96101",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/27432",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0261",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4064",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5744",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}