mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
65 lines
1.9 KiB
JSON
65 lines
1.9 KiB
JSON
{
|
|
"id": "CVE-1999-0523",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "1999-01-01T05:00:00.000",
|
|
"lastModified": "2022-08-17T10:15:12.903",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ICMP echo (ping) is allowed from arbitrary hosts."
|
|
}
|
|
],
|
|
"vendorComments": [
|
|
{
|
|
"organization": "Red Hat",
|
|
"comment": "Red Hat Enterprise Linux by default does respond to ICMP echo requests, although it\u2019s likely that in a production environment those would be filtered by some firewall on entry to your network. However you can happily block ICMP ping responses using iptables if you so wish, but note that there is no known vulnerability in allowing them.\n\nFor more details, please see:\nhttp://kbase.redhat.com/faq/FAQ_43_4304.shtm",
|
|
"lastModified": "2007-09-11T00:00:00"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 0.0
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 0.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0523",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |