mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
103 lines
3.9 KiB
JSON
103 lines
3.9 KiB
JSON
{
|
|
"id": "CVE-2007-4036",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-07-27T22:30:00.000",
|
|
"lastModified": "2018-10-15T21:33:03.647",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "** DISPUTED ** Guidance Software EnCase allows user-assisted remote attackers to cause a denial of service via (1) a corrupted Microsoft Exchange database, which triggers an application crash when many options are selected; (2) a corrupted NTFS filesystem, which causes the application to report \"memory allocation errors;\" or (3) deeply nested directories, which trigger an application crash during an Expand All action. NOTE: the vendor disputes the significance of these vectors because the user can select fewer options, there is no operational impact, or the user can do less expansion."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "** EN DISPUTA ** Guidance Software EnCase permite a atacantes remotos con la complicidad del usuario provocar una denegaci\u00f3n de servicio mediante (1) una base de datos corrupta Microsoft Exchange, que dispara la ca\u00edda de una aplicaci\u00f3n cuando se seleccionan muchas opciones; (2) un sistema de archivos NTFS corrupto, que provoca que la aplicaci\u00f3n informe de \"errores en la asignaci\u00f3n de memoria(memory allocation errors)\"; (3) directorios profundamente anidados, que disparan una ca\u00edda de aplicaci\u00f3n durante una operaci\u00f3n \"Expande Todo\" (Expand All). NOTA: El fabricante impugna la importancia de estos vectores porque el usuario puede seleccionar menos opciones, no hay impacto operacional, o el usuario puede hacer menos expansi\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:guidance_software:encase:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "390A2951-B37B-4CCD-BFA2-49AC404DB53C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.blackhat.com/html/bh-usa-07/bh-usa-07-speakers.html#Palmer",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Paper.v1_1.BH2007.pdf",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/474727/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/474750/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/474809/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/475335/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/25100",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |