René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

308 lines
8.3 KiB
JSON

{
"id": "CVE-2006-6504",
"sourceIdentifier": "secalert@redhat.com",
"published": "2006-12-20T01:28:00.000",
"lastModified": "2018-10-17T21:48:53.910",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption."
},
{
"lang": "es",
"value": "Mozilla Firefox 2.x anterior a 2.0.0.1, 1.5.x anterior a 1.5.0.9, y SeaMonkey anterior a 1.0.7 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a\u00f1adiendo un nodo DOM con un comentario SVG a otro tipo de documento, lo cual desemboca en una corrupci\u00f3n de memoria."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.5",
"versionEndExcluding": "1.5.0.9",
"matchCriteriaId": "A3FAAB80-9C12-47E9-BE5A-7763004F7A7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0",
"versionEndExcluding": "2.0.0.1",
"matchCriteriaId": "C911462E-7F1B-4C32-82FB-40816E7B4592"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.7",
"matchCriteriaId": "BD3C5C83-4F57-4D3A-A872-4F5BE7CD634B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0FA3A32E-445A-4D39-A8D5-75F5370AD23D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704"
}
]
}
]
}
],
"references": [
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://fedoranews.org/cms/node/2297",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://fedoranews.org/cms/node/2338",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2006-0758.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2006-0759.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2006-0760.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200701-02.xml",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1017417",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://securitytracker.com/id?1017418",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/928956",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:010",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-73.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_80_mozilla.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2007_06_mozilla.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/454939/100/0/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/archive/1/455145/100/0/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/archive/1/455728/100/200/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/21668",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-398-1",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-398-2",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA06-354A.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/5068",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0083",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-051.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://issues.rpath.com/browse/RPL-883",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11077",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}