René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

135 lines
3.8 KiB
JSON

{
"id": "CVE-2008-2499",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-05-29T16:32:00.000",
"lastModified": "2018-10-31T18:43:32.543",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the Community Services Multiplexer (aka MUX or StMux.exe) in IBM Lotus Sametime 7.5.1 CF1 and earlier, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code via a crafted URL."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en el Community Services Multiplexer (tambi\u00e9n conocido como MUX o StMux.exe) de IBM Lotus Sametime 7.5.1 CF1 y anteriores, y 8.x anterior a 8.0.1, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una URL manipulada."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_sametime:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.5",
"matchCriteriaId": "9D250D7E-88E7-46B7-8C63-C067D9889A76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_sametime:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.0.1",
"matchCriteriaId": "A811D9B9-99EF-4324-87ED-F13A311EAB67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_sametime:7.5.1:cf1:*:*:*:*:*:*",
"matchCriteriaId": "F8A12AF0-F301-4661-AD90-21077BF203B9"
}
]
}
]
}
],
"references": [
{
"url": "http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21303920",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/29328",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1020093",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1595/references",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-028/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42575",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}