mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-15 00:42:57 +00:00
92 lines
3.2 KiB
JSON
92 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2007-4547",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-08-27T23:17:00.000",
|
|
"lastModified": "2018-10-15T21:36:03.980",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unreal Commander 0.92 build 565 and 573 writes portions of heap memory into local files when extracting from an archive with malformed size information in a file header, which might allow user-assisted attackers to obtain sensitive information (memory contents) by reading the extracted files. NOTE: this issue is only a vulnerability if Unreal is run with privileges, or if the extracted files are made accessible to other users."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Unreal Commander 0.92 construcci\u00f3n 565 y 573 escribe porciones de la pila de memoria dentro de los archivos locales cuando estraen de un archivo con informaci\u00f3n de tama\u00f1o malformado en un archivo de cabecera, lo cual permite a atacantes con la intervenci\u00f3n de un usuario obtener informaci\u00f3n sensible (contenido de memoria) a trav\u00e9s de la lectura de los archivos extraidos. NOTA: este asunto es solo una vulnerabilidad si Unteal est\u00e1 funcionando con privilegios, o si los archivos extraidos se han hecho accesibles a otros usuarios."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:x-diesel:unreal_commander:0.92_build565:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E10A135-3DEA-4C76-8BDA-28252FE266E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:x-diesel:unreal_commander:0.92_build573:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A38B09DC-7E74-49EE-AA19-E9A542932AEF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/3060",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/477432/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/25419",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |