mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
200 lines
6.6 KiB
JSON
200 lines
6.6 KiB
JSON
{
|
|
"id": "CVE-2008-2654",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-06-13T18:41:00.000",
|
|
"lastModified": "2017-08-08T01:31:12.793",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Error de superaci\u00f3n del l\u00edmite (off-by-one) en la funci\u00f3n read_client en webhttpd.c en Motion 3.2.10 y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una petici\u00f3n larga al interfaz Motion HTTP Control, que dispara un desbordamiento de b\u00fafer basado en pila en algunas combinaciones de arquitectura de procesador y compilador."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-189"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.10",
|
|
"matchCriteriaId": "2EBD0F21-2FB6-4388-AE60-6F08B7F66BB7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.1.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D147C1E-A7CC-4C2D-A737-F8B3B385A70D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.1.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB41C1E0-6D13-4866-A8DC-9FC96FE963D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.1.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B63526C3-4163-47B5-890C-414E9C0BB30E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.1.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D536002E-9A4F-4586-9FA9-6F30BE90885E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E277E868-851C-4462-AB0F-E2153F0C7F09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1910DE64-CDD2-46F8-A8AE-0FD64F7D58E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39EBADC9-B374-4FAD-BB32-987D03849911"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72E7C90C-A1A7-4466-AB7F-58B0A412D9C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28575000-61BD-4477-B16B-69BB12C91071"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D8A1DB7-80BA-498C-9781-E60C41DA3503"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F469039A-4876-477D-8470-C4F5A5D6B70A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F39D6ECA-E207-490F-883C-1484D8B507DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavrsen:motion:3.2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C24FF31B-C7B7-4030-A46F-C925142897D5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=oss-security&m=121311577731820&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=oss-security&m=121314089321816&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=oss-security&m=121314329424538&w=2",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=oss-security&m=121314471626034&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://security.gentoo.org/glsa/glsa-200807-02.xml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/29636",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/1796",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42979",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |