René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

155 lines
4.1 KiB
JSON

{
"id": "CVE-2005-0100",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-02-07T05:00:00.000",
"lastModified": "2018-10-19T15:31:06.463",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20.0",
"matchCriteriaId": "18656642-C693-4BFD-A708-BCBFB5965C2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EA95B19B-F35D-4644-9E75-5A138A960C10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:xemacs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "21.4",
"matchCriteriaId": "C335DC66-8037-4457-942A-9F6B83333BAF"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=110780416112719&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2005/dsa-670",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-671",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-685",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:038",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-110.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-112.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-133.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/433928/30/5010/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/12462",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19246",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9408",
"source": "cve@mitre.org"
}
]
}