mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
100 lines
3.5 KiB
JSON
100 lines
3.5 KiB
JSON
{
|
|
"id": "CVE-2015-2869",
|
|
"sourceIdentifier": "cret@cert.org",
|
|
"published": "2015-07-21T15:59:00.067",
|
|
"lastModified": "2017-09-21T01:29:06.243",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The FileInfo plugin before 2.22 for Ghisler Total Commander allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via (1) a large Size value in the Archive Member Header of a COFF Archive Library file, (2) a large Number Of Symbols value in the 1st Linker Member of a COFF Archive Library file, (3) a large Resource Table Count value in the LE Header of a Linear Executable file, or (4) a large value in a certain Object field in a Resource Table Entry in a Linear Executable file."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad en el plugin FileInfo en sus versiones anteriores a 2.22 para Ghisler Total Commander permite a atacantes remotos provocar una denegaci\u00f3n de servicio mediante la lectura fuera de rango y ca\u00edda de la aplicaci\u00f3n a trav\u00e9s de (1) un valor de gran tama\u00f1o en la cabecera Archive Member de un archivo de la librer\u00eda COFF Archive, (2) un valor conformado por un gr\u00e1n n\u00famero de s\u00edmbolos en el primer Linker Member de un archivo de la liberer\u00eda COFF Archive, (3) un valor grande Resource Table Count en la cabecera LE de un archivo ejecutable lineal o (4) un valor grande en un campo de objeto dado en una entrada Resource Table en un archivo ejecutable lineal."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ghisler:total_commander:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.2.1",
|
|
"matchCriteriaId": "0A4CD64F-DE6D-48F2-A3A3-7F61A3EB4A07"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://blogs.cisco.com/security/talos/fileinfo-plugin-dos",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "http://totalcmd.net/plugring/fileinfo.html",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/813631",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/75955",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1033004",
|
|
"source": "cret@cert.org"
|
|
}
|
|
]
|
|
} |