2024-12-08 03:06:42 +00:00

185 lines
5.4 KiB
JSON

{
"id": "CVE-2006-4127",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-14T23:04:00.000",
"lastModified": "2024-11-21T00:15:13.517",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in DConnect Daemon 0.7.0 and earlier allow remote administrators to execute arbitrary code via format string specifiers that are not properly handled when calling the (1) privmsg() or (2) pubmsg functions from (a) cmd.user.c, (b) penalties.c, or (c) cmd.dc.c."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de cadena de formato en DConnect Daemon 0.7.0 y anteriores permiten a administradore remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante especificadores de cadena de formato que no son manejados adecuadamente al llamar a las funciones (1) privmsg() o (2) pubmsg desde (a) cmd.user.c, (b) penalties.c, o (c) cmd.dc.c."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"baseScore": 4.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dconnect:dconnect_daemon:0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C29EACF1-C006-4819-8E24-FDC6CC1BA321"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dconnect:dconnect_daemon:0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6A6E6F96-90F3-47CA-B6F6-B88A96A7709A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dconnect:dconnect_daemon:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B64776EF-2736-4542-B64C-BDD413E1F91B"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/21384",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1377",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016641",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.dc.ds.pg.gda.pl/",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.dc.ds.pg.gda.pl/?page=doc&doc=changelog",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/442440/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/19371",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3181",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28280",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/21384",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1377",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securitytracker.com/id?1016641",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.dc.ds.pg.gda.pl/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.dc.ds.pg.gda.pl/?page=doc&doc=changelog",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/442440/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/19371",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3181",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28280",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"evaluatorSolution": "Successful exploitation of this vulnerability requires superior user or administrator privileges.\r\nThis vulnerability is addressed in the following product release:\r\nDConnect, DConnect Daemon, 0.7.1"
}