mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
205 lines
7.2 KiB
JSON
205 lines
7.2 KiB
JSON
{
|
|
"id": "CVE-2011-1932",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2011-12-05T11:55:05.867",
|
|
"lastModified": "2024-11-21T01:27:20.190",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Directory traversal vulnerability in io/filesystem/filesystem.cc in Widelands before 15.1 might allow remote attackers to overwrite arbitrary files via . (dot) characters in a pathname that is used for a file transfer in an Internet game."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de salto de directorio en io/filesystem/filesystem.cc en Widelands antes de v15.1 podr\u00eda permitir a atacantes remotos sobreescribir ficheros de su elecci\u00f3n a trav\u00e9s de caracteres . (punto) en un nombre de ruta que se utiliza para la transferencia de un archivo en un juego en Internet."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
|
|
"baseScore": 6.4,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C310EED8-E0FE-4E51-AF0A-6A53924DC4BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "054E4DC2-A9F7-4680-A33C-B816AEE0A148"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build10_release_candidate:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B2DF3D7-AD20-4578-A730-C2515038A97D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFF3C32F-3C38-4112-B575-6A6F91173CFF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build11_release_candidate:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B45B376-434B-456B-B491-CF7B0BB0F597"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build12:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB91F6CB-0B0D-435E-8CC9-7405053966E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build12_release_candidate:*:*:*:*:*:*",
|
|
"matchCriteriaId": "208433B7-008C-4771-8508-7640782F018F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build13:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF11D5F6-5103-4561-A1BE-2761AEDF96F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build13_release_candidate:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17E65533-7F5C-4CA3-9157-063E93F1E6AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build13_release_candidate2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6803C19-950C-4A27-9B07-DFA3512BBB23"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build14:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F70B6239-4BD3-4E90-80E6-BBBFD1518A56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build14_release_candidate:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76F3B6EA-CDB0-47ED-A6BF-BE5F99467DA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B88CCD70-B9DB-47DF-AF80-84ABC905E272"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "460D9138-AA35-4A25-A5EB-1613BE29F5C5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD22A431-E827-4621-94CA-4A9F2A48F025"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "820E897A-D5C7-49E2-884F-2A722FA36B48"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40FE6D11-D0A5-4E9B-A990-BB73FCD095E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D9D5D4C-ADF9-483E-8318-66866B2863E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C1AE263-930F-4F2D-B6F5-AF96DA7239D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:widelands:widelands:-:build9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9603E399-1F1D-4C35-82C9-4382F1A70926"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bazaar.launchpad.net/~widelands-dev/widelands/build-15/revision/5021",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Release Notes",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617960",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Issue Tracking",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://bazaar.launchpad.net/~widelands-dev/widelands/build-15/revision/5021",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Release Notes",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617960",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Issue Tracking",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |