René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

118 lines
3.4 KiB
JSON

{
"id": "CVE-2007-6701",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-13T21:00:00.000",
"lastModified": "2017-08-08T01:29:17.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP4 for Windows allow remote attackers to execute arbitrary code via long arguments to multiple unspecified RPC functions, aka Novell bug 287919, a different vulnerability than CVE-2007-2954."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en el servicio Spooler (nwspool.dll) de Novell Client 4.91 SP4 para Windows permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos largos de m\u00faltiples funciones RCP no especificadas, tambi\u00e9n conocido como Novell bug 287919, una vulnerabilidad diferente a CVE-2007-2954."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:client:4.91:sp4:*:*:*:*:*:*",
"matchCriteriaId": "EDDFB0E9-EF4C-4E9E-9369-453AF2A8481F"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2007-08/0082.html",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1018471",
"source": "cve@mitre.org"
},
{
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5005400.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25092",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-045.html",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35653",
"source": "cve@mitre.org"
}
]
}