mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
94 lines
3.3 KiB
JSON
94 lines
3.3 KiB
JSON
{
|
|
"id": "CVE-2007-6263",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-12-06T15:46:00.000",
|
|
"lastModified": "2009-09-15T05:09:20.860",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The dataconn function in ftpd.c in netkit ftpd (netkit-ftpd) 0.17, when certain modifications to support SSL have been introduced, calls fclose on an uninitialized file stream, which allows remote attackers to cause a denial of service (daemon crash) and possibly have unspecified other impact via some types of FTP over SSL protocol behavior, as demonstrated by breaking a passive FTP DATA connection in a way that triggers an error in the server's SSL_accept function. NOTE: the netkit ftp issue is covered by CVE-2007-5769."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funci\u00f3n dataconn en ftpd.c de netkit ftpd (netkit-ftpd) 0.17, al introducir ciertas modificaciones para el soporte SSL, llama a la funci\u00f3n fclose sobre un flujo de fichero no inicializado, lo cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) y posiblemente tener alg\u00fan otro impacto desconocido mediante ciertos comportamientos de FTP sobre SSL, como ha sido demostrado rompiendo una conexi\u00f3n pasiva FTP DATA de forma que provoca un error en la funci\u00f3n SSL_accept del servidor. NOTA: el asunto de netkit ftp est\u00e1 cubierto en CVE-2007-5769."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:netkit-ftp:netkit_ftp:0.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB45F7C8-CDB0-40EE-A26E-12CA9577EDFB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugs.gentoo.org/show_bug.cgi?id=199206",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=full-disclosure&m=119704348003382&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200801-17.xml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/26763",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |