mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
173 lines
5.6 KiB
JSON
173 lines
5.6 KiB
JSON
{
|
|
"id": "CVE-2002-1277",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2002-11-12T05:00:00.000",
|
|
"lastModified": "2008-09-05T20:30:12.767",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in Window Maker (wmaker) 0.80.0 and earlier may allow remote attackers to execute arbitrary code via a certain image file that is not properly handled when Window Maker uses width and height information to allocate a buffer."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer en Window Maker (wmaker) 0.80.0 y anteriores puede permitir a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una cierta fichero de imagen que no es manejado adecuadamente cuando Window Maker usa informaci\u00f3n de ancho y alto para asignar un b\u00fafer."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.20.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6217910D-C42C-45A1-9093-79AC7913E8D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.52.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24D2F210-3F2C-4E59-881B-527C6D97C074"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.53:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "258F7285-39B4-4324-A764-135C6E5BC05F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.61:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61B98917-1DCD-4E44-B795-77D6E5EF4591"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.61.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C68989EA-4697-45D7-9AEC-A14DE785A00A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.62:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2AA2B5B-C63F-4076-A759-2B9C04D6151B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.62.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9F849D3-AF59-4318-8205-8B6E7A8129D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.63:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36012A18-0215-4357-94A0-A18A77165CC5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.63.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D19C4E0B-1E47-44E1-9963-6C8596B0E746"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.64:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B674EE20-5629-4693-BC70-E72A32304F94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.65:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "433971EF-9B9D-4C7A-840A-1CF06B8A08F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.80:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E462EB39-1D25-468F-A0CF-59BFB51C618C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000548",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2002/dsa-190",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.iss.net/security_center/static/10560.php",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-085.php",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-009.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-043.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/6119",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |