mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
242 lines
8.5 KiB
JSON
242 lines
8.5 KiB
JSON
{
|
|
"id": "CVE-2005-4584",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-12-29T11:03:00.000",
|
|
"lastModified": "2018-08-13T21:47:24.290",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "BZFlag server 2.0.4 and earlier allows remote attackers to cause a denial of service (application crash) via a callsign that is not followed by a NULL (\\0) character."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.0.4",
|
|
"matchCriteriaId": "E493369E-9E6B-4EE3-B152-E444B143603B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39405043-3AC2-4F05-A4C1-3BE195B52629"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34B84161-C71D-4628-96BB-53AB309A06CE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_2_patch_1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC41F6C1-C086-4566-AD15-3A168D84DB70"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_2_patch_2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1426A226-D457-4444-80CA-9A53C50A0516"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7c_release_2_patch_3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3DB4C95-10FA-41A1-9788-FE5FA400F1B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4189A91-DB01-4C61-BB88-2020FAE9C589"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6D72429-55F8-4432-9B1E-D5867AF19CBB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0EE3055C-9706-4165-AB74-94AAB1D2BAD0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "286A8DE6-FD52-42F4-A6AF-36799CEECD2E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3E43F75-822D-4DF5-8CBB-854B069D1D72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE314C04-8ABC-4543-A963-76B80FD3675F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0CF0820D-E31F-4308-8A2A-413B64B4AEDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3375EC5B-7A6C-4DCC-8897-5D0A5F9673F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7d9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B96CCB7A-A14C-41BF-B315-7BFF1D8343F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E2522F8-7AC4-4058-AF76-61177589B278"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0195ABCA-BDDB-41E7-BE34-8A7EAEDC063E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E416437-2528-405A-A4F5-132399EBB6F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "299E6D69-CED1-403E-ACA0-1B1B1923CE99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7e6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16D9A487-6B55-4D97-9B64-DDE908420817"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7g0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5231E037-D966-4803-8F6B-E1F4C42705AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.7g2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A47E0BE-0A13-4FB1-B16B-677F2A7C9962"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C98A2DE-C6BD-42ED-B3E0-F0D2573BE3A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFDE88AC-67A8-4575-85FC-03E1CF217899"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB8250CB-BA59-490D-A135-288D3D5FB695"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6788DBC8-080A-45F8-AF06-9F3CAF699390"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:1.10.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1CD22237-0800-4082-9DFA-656751D796C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "144036C4-54EF-40E9-8ACA-1C4E9292C546"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bzflag:bzflag_server:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD44A73B-ABF0-45C0-91C2-1F02E17AD6A0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://aluigi.altervista.org/adv/bzflagboom-adv.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://cvs.sourceforge.net/viewcvs.py/*checkout*/bzflag/bzflag/ChangeLog?rev=2.103",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1015418",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/16066",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23872",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |