René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

119 lines
3.5 KiB
JSON

{
"id": "CVE-2005-4351",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-31T05:00:00.000",
"lastModified": "2017-07-20T01:29:13.817",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dragonfly:dragonfly:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2",
"matchCriteriaId": "D49632E3-D2DD-4D9A-AE3B-D1A43103DA67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:*:stable:*:*:*:*:*:*",
"versionEndIncluding": "6.0",
"matchCriteriaId": "C95AA435-BA20-4451-9283-2B62E64B6B40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:7.0:current:*:*:*:*:*:*",
"matchCriteriaId": "C4E775BA-6DC1-4006-83A4-D30EA57417FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.15",
"matchCriteriaId": "F7A893C0-1374-4B55-92C9-47CA407B7842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.8",
"matchCriteriaId": "64487B62-3A07-4294-B8A4-445BFAA0FFAA"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html",
"source": "cve@mitre.org"
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041177.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.redteam-pentesting.de/advisories/rt-sa-2005-015.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24037",
"source": "cve@mitre.org"
}
]
}