2024-12-08 03:06:42 +00:00

132 lines
4.3 KiB
JSON

{
"id": "CVE-2007-5722",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-10-30T21:46:00.000",
"lastModified": "2024-11-21T00:38:32.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in a certain ActiveX control in GLChat.ocx 2.5.1.32 in GlobalLink 2.7.0.8, as used in Ourgame GLWorld and possibly other products, allows remote attackers to execute arbitrary code via a long first argument to the ConnectAndEnterRoom method, possibly involving the GLCHAT.GLChatCtrl.1 control, as originally exploited in the wild in October 2007. NOTE: some of these details are obtained from third party information. NOTE: this was originally reported as a heap-based issue by some sources."
},
{
"lang": "es",
"value": "Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en un determinado control ActiveX GLChat.ocx versi\u00f3n 2.5.1.32 en GlobalLink versi\u00f3n 2.7.0.8, tal y como es usado en Ourgame GLWorld y posiblemente otros productos, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un primer argumento largo en el m\u00e9todo ConnectAndEnterRoom, posiblemente involucrando el control GLCHAT.GLChatCtrl., como es explotado originalmente \u201cin the wild\u201d en octubre de 2007. NOTA: algunos de estos datos son obtenidos de la informaci\u00f3n de terceros. NOTA: esto fue reportado originalmente como un problema en la regi\u00f3n heap de la memoria por algunas fuentes."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ourgame.com:globallink:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8D31BF-AF92-435C-8BBE-54D67A09B0A5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:ourgame.com:glworld:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18902EFB-80BD-4B06-AAFE-1E3F9C0B838B"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/38837",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/27500",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/26244",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38222",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/38837",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/27500",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/26244",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38222",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}