mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
107 lines
3.2 KiB
JSON
107 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2006-4232",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-08-18T20:04:00.000",
|
|
"lastModified": "2017-07-20T01:32:56.163",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Race condition in the grid-proxy-init tool in Globus Toolkit 3.2.x, 4.0.x, and 4.1.0 before 20060815 allows local users to steal credential data by replacing the proxy credentials file in between file creation and the check for exclusive file access."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Condici\u00f3n de carrera en la herramienta grid-proxy-init en Globus Toolkit 3.2.x, 4.0.2, y 4.1.0 anterior al 15/08/2006 permite a usuarios locales robar informaci\u00f3n de credenciales reemplazando el archivo de credenciales del proxy entre la creaci\u00f3n del archivo y la comprobaci\u00f3n de acceso exclusivo al archivo."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 1.2
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 1.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:globus:globus_toolkit:3.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F72CDC1D-4CF8-4E8A-8A7F-1C41A21DAD92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:globus:globus_toolkit:4.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9E69418-82DA-49DD-BB34-8CD79C3BF80B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:globus:globus_toolkit:4.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FF249FE-99B9-45CC-B666-B59F2589DFC8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/19549",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3290",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28408",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |