René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

97 lines
3.2 KiB
JSON

{
"id": "CVE-2006-2155",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-05-03T10:02:00.000",
"lastModified": "2017-07-20T01:31:13.630",
"vulnStatus": "Modified",
"evaluatorSolution": "Retrospect 7.5:\r\nApply Retrospect Driver Update 7.5.1.105.\r\nhttp://ftp.dantz.com/pub/updates/ru751105.exe\r\n\r\nRetrospect 7.0:\r\nApply Application Security Update 7.0.344 (requires Retrospect 7.0.326 or Retrospect Express 7.0.301).\r\nhttp://download.dantz.com/archives/Retro-EN_7_0_344.exe\r\n\r\nRetrospect 6.5:\r\nApply Application Security Update 6.5.382 (requires Retrospect 6.5.350 or Retrospect Express 6.5.350).\r\nhttp://download.dantz.com/archives/Retro-EN_6_5_382.exe",
"descriptions": [
{
"lang": "en",
"value": "EMC Retrospect for Windows 6.5 before 6.5.382, 7.0 before 7.0.344, and 7.5 before 7.5.1.105 allows local users to execute arbitrary code by replacing the Retrospect.exe file, possibly due to improper file permissions."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:retrospect:*:*:windows:*:*:*:*:*",
"versionEndIncluding": "6.5",
"matchCriteriaId": "A891F97C-905B-4B59-9BEE-78967D3FC036"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:retrospect:*:*:windows:*:*:*:*:*",
"versionEndIncluding": "7.0",
"matchCriteriaId": "B81A28AB-E359-4F07-813C-82CF5E5BBF1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emc:retrospect:*:*:windows:*:*:*:*:*",
"versionEndIncluding": "7.5",
"matchCriteriaId": "289D648B-DE4F-46C9-935A-5A539C28BD37"
}
]
}
]
}
],
"references": [
{
"url": "http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9507&r=0.7344324",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1612",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26227",
"source": "cve@mitre.org"
}
]
}