René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

167 lines
5.2 KiB
JSON

{
"id": "CVE-2002-1306",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-11-29T05:00:00.000",
"lastModified": "2016-10-18T02:25:40.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x before 3.0.4, allow (1) local and possibly remote attackers to execute arbitrary code via the \"lisa\" daemon, and (2) remote attackers to execute arbitrary code via a certain \"lan://\" URL."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en LISa en KDE 2.x a partir de 2.1, y KDE 3.x anteriores a 3.0.4 permiten \r\na atacantes locales y posiblemente remotos ejecutar c\u00f3digo mediante el demonio \"lisa\", y\r\na atacantes remotos ejecutar c\u00f3digo arbitrario mediante una cierta URL de tipo \"lan://\""
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C5E480F-A87E-4583-BC75-8596206C0895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2EF4C94E-54BB-44DB-BB7D-841419C4D3A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B292C704-EDFA-4060-90DF-0A3906DB0AC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B5DBFB51-48EB-41E5-9712-0A5368EE56A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EEAE9343-7A7F-4CB0-8CEF-52D61BD689C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3F531972-E0A7-4E7C-A899-3766CEAAE2EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEED379-3111-4451-B782-8C66CE568A1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B146FCD3-F6E7-4412-94FD-F9E66089C227"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99CB51E4-0BFC-4C7C-B9EE-3DBCB0188D73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kde:kde:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C629F0C8-C765-4076-B426-80929F9CE285"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=103712329102632&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=103728981029342&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.ciac.org/ciac/bulletins/n-020.shtml",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2002/dsa-214",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/10597.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/10598.php",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kde.org/info/security/advisory-20021111-2.txt",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-080.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2002_042_kdenetwork.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-220.html",
"source": "cve@mitre.org"
}
]
}