René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

82 lines
3.5 KiB
JSON

{
"id": "CVE-2007-5145",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-10-01T05:17:00.000",
"lastModified": "2018-10-30T16:25:26.793",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in system DLL files in Microsoft Windows XP, as used by Microsoft Windows Explorer (explorer.exe) 6.00.2900.2180, Don Ho Notepad++, unspecified Adobe Macromedia applications, and other programs, allow user-assisted remote attackers to cause a denial of service (application crash) via long strings in the (1) author, (2) title, (3) subject, and (4) comment Properties fields of a file, possibly involving improper handling of extended file attributes by the (a) NtQueryInformationFile, (b) NtQueryDirectoryFile, (c) NtSetInformationFile, (d) FileAllInformation, (e) FileNameInformation, and other FILE_INFORMATION_CLASS functions in ntdll.dll and the (f) GetFileAttributesExW and (g) GetFileAttributesW functions in kernel32.dll, a related issue to CVE-2007-1347."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en ficheros DLL del sistema de Microsoft Windows XP, tal y como se usan en Microsoft Windows Explorer (explorer.exe) 6.00.2900.2180, Don Ho Notepad++, aplicaciones Adobe Macromedia no especificadas, y otros programas, permiten a atacantes remotos con la complicidad del usuario provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) mediante cadenas largas en los campos de Propiedaes de un fichero (1) author, (2) title, (3) subject, and (4) comment ; posiblemente involucrando manjeo inapropiado de atributos de fichero extendidos por (a) NtQueryInformationFile, (b) NtQueryDirectoryFile, (c) NtSetInformationFile, (d) FileAllInformation, (e) FileNameInformation, y otras funciones FILE_INFORMATION_CLASS functions de ntdll.dll y las fucniones (f) GetFileAttributesExW y (g) GetFileAttributesW de kernel32.dll, vulnerabilidad diferente de CVE-2007-1347."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
}
]
}
]
}
],
"references": [
{
"url": "http://lostmon.blogspot.com/2007/06/buffer-overflow-in-extended-file.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}