mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
166 lines
5.2 KiB
JSON
166 lines
5.2 KiB
JSON
{
|
|
"id": "CVE-2008-4770",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-01-16T21:30:03.327",
|
|
"lastModified": "2017-09-29T01:32:20.743",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to \"encoding type.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funci\u00f3n CMsgReader::readRect en el componente VNC Viewer en RealVNC VNC Free Edition v4.0 hasta v4.1.2, Enterprise Edition vE4.0 hasta vE4.4.2, y Personal Edition vP4.0 hasta vP4.4.2 permite a servidores remotos VNC ejecutar c\u00f3digo de su elecci\u00f3n mediante el protocolo de datos RFB manipulado, relacionado con \"tipo codificado\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realvnc:realvnc:4.0:*:free:*:*:*:*:*",
|
|
"matchCriteriaId": "D33C48F6-27C1-4AA4-A027-71E06E31B53F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realvnc:realvnc:4.1.2:*:free:*:*:*:*:*",
|
|
"matchCriteriaId": "1D102EDC-3B06-4880-8A93-155562A2B209"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realvnc:realvnc:4.4.2:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "80F206D4-09C2-478C-A429-C672B635EF10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realvnc:realvnc:e4.0:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "48BE82EC-F0F2-425C-A7DB-63EFF4A7702E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realvnc:realvnc:p4.0:*:personal:*:*:*:*:*",
|
|
"matchCriteriaId": "2785BEA3-4A77-4204-92D1-F66140302B2E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realvnc:realvnc:p4.4.2:*:personal:*:*:*:*:*",
|
|
"matchCriteriaId": "5140685C-E1CF-4B07-82DE-EAD311994E7B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.realvnc.com/products/free/4.1/release-notes.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.realvnc.com/products/upgrade.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2009-0261.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/31832",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/33263",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/2868",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45969",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47937",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01025.html",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |