mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
97 lines
3.2 KiB
JSON
97 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2006-2155",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-05-03T10:02:00.000",
|
|
"lastModified": "2017-07-20T01:31:13.630",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorSolution": "Retrospect 7.5:\r\nApply Retrospect Driver Update 7.5.1.105.\r\nhttp://ftp.dantz.com/pub/updates/ru751105.exe\r\n\r\nRetrospect 7.0:\r\nApply Application Security Update 7.0.344 (requires Retrospect 7.0.326 or Retrospect Express 7.0.301).\r\nhttp://download.dantz.com/archives/Retro-EN_7_0_344.exe\r\n\r\nRetrospect 6.5:\r\nApply Application Security Update 6.5.382 (requires Retrospect 6.5.350 or Retrospect Express 6.5.350).\r\nhttp://download.dantz.com/archives/Retro-EN_6_5_382.exe",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "EMC Retrospect for Windows 6.5 before 6.5.382, 7.0 before 7.0.344, and 7.5 before 7.5.1.105 allows local users to execute arbitrary code by replacing the Retrospect.exe file, possibly due to improper file permissions."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 4.6
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emc:retrospect:*:*:windows:*:*:*:*:*",
|
|
"versionEndIncluding": "6.5",
|
|
"matchCriteriaId": "A891F97C-905B-4B59-9BEE-78967D3FC036"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emc:retrospect:*:*:windows:*:*:*:*:*",
|
|
"versionEndIncluding": "7.0",
|
|
"matchCriteriaId": "B81A28AB-E359-4F07-813C-82CF5E5BBF1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emc:retrospect:*:*:windows:*:*:*:*:*",
|
|
"versionEndIncluding": "7.5",
|
|
"matchCriteriaId": "289D648B-DE4F-46C9-935A-5A539C28BD37"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://kb.dantz.com/display/2n/articleDirect/index.asp?aid=9507&r=0.7344324",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/1612",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26227",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |