mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
258 lines
10 KiB
JSON
258 lines
10 KiB
JSON
{
|
|
"id": "CVE-2008-1472",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-03-24T22:44:00.000",
|
|
"lastModified": "2018-10-11T20:34:57.193",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en el control ActiveX ListCtrl (ListCtrl.ocx), como es usado en varios productos de CA, incluyendo BrightStor ARCserve Backup versi\u00f3n R11.5, Desktop Management Suite versiones r11.1 hasta r11.2 y productos Unicenter versiones r11.1 hasta r11. 2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (bloqueo) por medio de un argumento largo en el m\u00e9todo AddColumn."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:computer_associates:brightstor_arcserve_backup_laptops_desktops:11.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8CB967E4-2CE5-4283-A798-2C083AFB5B56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8FAF118-7DCB-4F6E-8645-102ED226828B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04E5D3CF-9015-4D84-A498-25120C4DDC4E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.1:ga:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0BC9155B-394F-4DB0-ACEE-CFF62E03A44A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEBE5366-CEDA-4CF2-9625-13E9D9E93B41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:computer_associates:unicenter_dsm_r11_list_control_atx:11.2.3.1895:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C68A1807-ED3A-4E7B-84BF-BB6AD0916174"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21C1E9A1-00F4-4866-9899-D644BD1E6E65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A89E3C3-861F-41DE-B46C-776E4BDC6F16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:asset_management:r11.1:ga:*:*:*:*:*:*",
|
|
"matchCriteriaId": "170FCD6A-792C-452D-97E3-FE9A354D95D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B9F9C9B-CD0E-42B6-B654-EE9E16A93790"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBD24EBE-2942-4A0D-9481-FEC5BE9C94C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:asset_management:r11.2:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80486731-420B-4B2F-B2C3-B40E0C57ACFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4E67182-4AC8-4094-AC4F-815E40AE82E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2A6834E-2E6C-4DC6-B8F7-BB3FE643BE5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.1:ga:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D4976C0-DF5F-4A7E-AEC1-6C90E82F5047"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C03C0146-12CF-437E-B13A-C13FC06EC0F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2FE92F0-0F01-455F-8A13-1FC8E65F2117"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:desktop_management_bundle:r11.2:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "078BC506-4092-4FE4-8AD2-1DDD92848852"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1607DE7-0078-4BF3-8E28-59F1CBC7775A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0834E9C-2B65-4AB9-B4A7-410282967975"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:remote_control:r11.1:ga:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71B90EAA-275B-4E9E-B254-C4EC8158939F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C3338E5-87AC-4D7C-96EF-38A8B43D0060"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCD51973-2876-44AD-8FC5-0469267E71C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:remote_control:r11.2:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "860B437B-5C99-421D-BAAE-56F583DAA532"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7AF37FA7-6556-49FC-B7C9-D5530BDA00D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92EBC724-75AB-4201-AD97-1A05A7F46941"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:software_delivery:r11.1:ga:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50BCB284-7A16-4EAE-A8DF-9C432CD71490"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "174BBEAB-EE21-4CBC-BE54-E51A4DD95D28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57EC5134-D419-44A2-885C-72CB7724F0E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:unicenter:software_delivery:r11.2:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CDB0DF2-6160-4059-B379-78E45B4E8D4D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/489893/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/490263/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/28268",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1019617",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/0902/references",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41225",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/5264",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |