René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

109 lines
3.6 KiB
JSON

{
"id": "CVE-2002-0188",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-05-29T04:00:00.000",
"lastModified": "2021-07-23T12:55:03.667",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the second variant of the \"Content Disposition\" vulnerability."
},
{
"lang": "es",
"value": "Microsoft Internet Explorer 5.01 y 6.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante los campos de cabecera Content-Type y Content-Disposition malformados; lo que hace que la aplicaci\u00f3n que deber\u00eda manejar el fichero falso lo devuelva al sistema operativo en vez levantar un mensaje de error. Tamb\u00eden conocida como segunda variante de la vulnerabilidad de \"Disposici\u00f3n de contenidos\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*",
"matchCriteriaId": "6219D36E-9E2C-4DC7-8FD5-FAD144A333F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.01:sp1:*:*:*:*:*:*",
"matchCriteriaId": "3BFFB565-F656-43E3-89E1-E412DC4C9D41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.01:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BD3A3282-8842-4708-AF7B-0AFBEB5D4F9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A19F6133-25D1-44A5-B6B9-354703436783"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0126.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/9086.php",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.lac.co.jp/security/english/snsadv_e/48_e.html",
"source": "cve@mitre.org"
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-023",
"source": "cve@mitre.org"
}
]
}