mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
209 lines
7.1 KiB
JSON
209 lines
7.1 KiB
JSON
{
|
|
"id": "CVE-2006-2489",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-05-19T23:02:00.000",
|
|
"lastModified": "2018-10-03T21:41:02.777",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Integer overflow in CGI scripts in Nagios 1.x before 1.4.1 and 2.x before 2.3.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a content length (Content-Length) HTTP header. NOTE: this is a different vulnerability than CVE-2006-2162."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1CA91B05-9578-46D8-A21C-4E3C4AB4936A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52432776-C9C6-4CA7-B3D9-87513CBA5716"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "601958D5-B393-4EFA-9A6F-A5A04A95F4BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.0b3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99B2E88A-A611-43C5-8037-411D6B78EC03"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2DCEFBFC-38BD-4F78-B068-1A90C6199CEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.0b5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E61ACC55-1002-4FA3-8E5A-52041CE5DCD9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.0b6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C773265-0BE7-463A-8E24-84D804F14AF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A847327-D74E-460C-9F6F-E04C9B77E0C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F7425E3-F152-439B-B95F-5160E4593DBA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E5911624-5BD8-4A40-B417-FCD926D352BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF45013F-A844-4726-8B2A-EF602A3BC4C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3A91E463-D239-4853-8A63-E01EE7DB319F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0b1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "239CAF7F-E9BF-4D0F-BB99-EF51E1366516"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0b2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "738DF14D-A716-46F0-87AC-2DB2F1E44594"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0b3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E8E1234-9F0D-4E6F-BF58-5DAE8E41DB85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0073F69B-C5FA-470A-BA95-9C4E8033F5CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0b5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AAA7C5B6-C13D-4814-AA7B-444CF12E4DEF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0b6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1209D1C-DD27-41FC-8DAF-BFC0B4B1D602"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0rc1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39551FFC-E1F0-4D45-ADA6-AB3E74BB576D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.0rc2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BED52AA-BE20-447C-8896-4B591C42F66A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82DE68E3-7003-4675-96A9-6F7308E1E39C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E3F8DC3-2F34-4E11-A796-4EA7CB17FDDB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nagios:nagios:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7ADCBA8C-06DB-4D85-AEED-807E64A29DFB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.debian.org/security/2006/dsa-1072",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.nagios.org/development/changelog.php",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/18059",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/1822",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26454",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://usn.ubuntu.com/287-1/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |