René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

101 lines
3.5 KiB
JSON

{
"id": "CVE-2008-1044",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-27T19:44:00.000",
"lastModified": "2017-09-29T01:30:31.630",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the Quantum Streaming Player (Quantum Streaming IE Player) ActiveX control (aka QSP2IE.QSP2IE) in qsp2ie07076007.dll 7.7.6.7 and qsp2ie07074039.dll 7.7.4.39 in Move Media Player allows remote attackers to execute arbitrary code via a long argument to the UploadLogs method, a different vector than CVE-2007-4722. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en el control ActiveX Quantum Streaming Player (Quantum Streaming IE Player)(tambi\u00e9n conocido como QSP2IE.QSP2IE) de qsp2ie07076007.dll 7.7.6.7 y qsp2ie07074039.dll 7.7.4.39 en Move Media Player permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un argumento largo del m\u00e9todo UploadLogs, un vector diferente a CVE-2007-4722.\r\nNOTA: alguno de estos detalles han sido obtenidos a partir de la informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:move_networks_inc:move_media_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "881304CC-9DCA-4FCF-A8AB-4C8F673A7568"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:move_networks_inc:qunatum_streaming_player:7.7.4_39:*:*:*:*:*:*:*",
"matchCriteriaId": "903D471C-C03B-4FAC-89F9-81C1F067075E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:move_networks_inc:qunatum_streaming_player:7.7.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2322829B-51BF-46B5-A79D-E0BF7C1F0DE4"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060460.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/27995",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0684",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/5190",
"source": "cve@mitre.org"
}
]
}