2024-12-08 03:06:42 +00:00

184 lines
4.9 KiB
JSON

{
"id": "CVE-2006-6979",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-02-08T18:28:00.000",
"lastModified": "2024-11-21T00:24:05.967",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ruby handlers in the Magnatune component in Amarok do not properly quote text in certain contexts, probably including construction of an unzip command line, which allows attackers to execute arbitrary commands via shell metacharacters."
},
{
"lang": "es",
"value": "Los manejadores de ruby en el componente Magnatune en Amarok, no cita apropiadamente el texto en ciertos contextos, probablemente incluyendo la construcci\u00f3n de una l\u00ednea de comando unzip, lo que permite a atacantes ejecutar comandos arbitrario por medio de metacaracteres de shell."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amarok:amarok:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E570741F-43B4-4D13-A84E-8DE0E59436A4"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=166901",
"source": "cve@mitre.org"
},
{
"url": "http://bugs.kde.org/show_bug.cgi?id=138499",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0015.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/23984",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/24159",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/24510",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200703-11.xml",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/22568",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/0613",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=166901",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://bugs.kde.org/show_bug.cgi?id=138499",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0015.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/23984",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/24159",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/24510",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200703-11.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/22568",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/0613",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}