mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
173 lines
5.8 KiB
JSON
173 lines
5.8 KiB
JSON
{
|
|
"id": "CVE-2009-5029",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2013-05-02T14:55:01.380",
|
|
"lastModified": "2023-02-13T02:20:50.110",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de entero en la funci\u00f3n __tzfile_read en glibc anterior a v2.15 que permite a atacantes dependientes del contexto causar una denegaci\u00f3n de servicios (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un fichero timezone (TZ), como se demostr\u00f3 usando vsftpd."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-189"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.14",
|
|
"matchCriteriaId": "78E4362C-F0B7-482C-AABD-F34E35ABCE85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E5C0577C-6BC7-418F-B2C5-B74800D43418"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FEA795F7-8AAC-42BA-971B-601346704BD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5CADA314-C0D0-40F8-9019-884F17D0B54A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "255E0C0D-0B70-4C10-BF7C-34193AA24C42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F424F2F5-D7E4-4A13-A8CF-32D466610BDF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DC4E7AE-BDC4-48F1-9FDE-3F3FAA3F40F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1329215-C53A-40D5-8E9C-F457D092E483"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E2A0F12-FD00-40B9-86AD-7D082385E5DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8ED8F0E8-A969-4F7F-A100-662F4A5426FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9416576F-A605-45BE-AA01-FEF357A66979"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE582B8F-4E31-4D0F-B2F9-AC83C855F751"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB56D9C9-13B3-418C-B06C-0997E165F1C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "19D5667D-5EA4-4B44-BF8A-9C10506BD4E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DF8E0DCD-8D39-4C89-9B4C-37025D9BE3A9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=97ac2654b2d831acaa18a2b018b0736245903fd2",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761245",
|
|
"source": "secalert@redhat.com"
|
|
}
|
|
]
|
|
} |