2024-12-08 03:06:42 +00:00

159 lines
4.4 KiB
JSON

{
"id": "CVE-2007-5933",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-11-13T20:46:00.000",
"lastModified": "2024-11-21T00:38:58.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pioneers (formerly gnocatan) before 0.11.3 allows remote attackers to cause a denial of service (crash) by triggering a delete operation while the Session object is still being used, as demonstrated by causing a \"Broken pipe\" error."
},
{
"lang": "es",
"value": "Pioneers (anteriormente gnocatan) versiones anteriores a 0.11.3, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n) mediante la activaci\u00f3n de una operaci\u00f3n de borrado mientras el objeto Session se sigue usando, como es demostrado causando un error de \"Broken pipe\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pioneers:pioneers:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.11.2",
"matchCriteriaId": "9A283224-7E19-4A35-AFEC-C10FAE844928"
}
]
}
]
}
],
"references": [
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449541",
"source": "cve@mitre.org"
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198807",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/27522",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/27646",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200711-20.xml",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1019024",
"source": "cve@mitre.org"
},
{
"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1791176&group_id=5095&atid=305095",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/26391",
"source": "cve@mitre.org"
},
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449541",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198807",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/27522",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/27646",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200711-20.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securitytracker.com/id?1019024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1791176&group_id=5095&atid=305095",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/26391",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}