2024-12-08 03:06:42 +00:00

184 lines
6.7 KiB
JSON

{
"id": "CVE-2007-2197",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-24T17:19:00.000",
"lastModified": "2024-11-21T00:30:09.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition in the NeatUpload ASP.NET component 1.2.11 through 1.2.16, 1.1.18 through 1.1.23, and trunk.379 through trunk.445 allows remote attackers to obtain other clients' HTTP responses via multiple simultaneous requests, which triggers multiple calls to HttpWorkerRequest.FlushResponse for the same HttpWorkerRequest object and causes a buffer to be reused for a different request."
},
{
"lang": "es",
"value": "Condici\u00f3n de carrera en el componente NeatUpload ASP.NET 1.2.11 hasta el 1.2.16, 1.1.18 hasta el 1.1.23, y trunk.379 hasta trunk.445 permite a atacantes remotos obtener informaci\u00f3n de otros clientes HTTP a trav\u00e9s de m\u00faltiples respuestas simultaneas de clientes, lo cual dispara m\u00faltiples llamadas en HttpWorkerRequest.FlushResponse para el mismo objeto HttpWorkerRequest y provoca un buffer sea reutilizado para diferentes respuestas."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F28F8C39-7E65-46F9-A547-15527BC66308"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E49C50FE-3B50-4F39-BEC1-0A61DC6ACDEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "CC172C30-0C37-4521-877F-F678274C05B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "78B684B3-07E2-4EFE-8EF0-706D77DDFC96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8755BF-9D57-4FEE-91F1-FC224DBA431D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "4E95B64F-A426-412D-84FC-718AC2B8F89C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7D3A35-F650-4F1B-8022-56E46BB95039"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1A8F8C7D-199D-4559-A5AD-70B8DC0C6C67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0C30F900-F512-43ED-94B5-B16DC21BA826"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D911C642-075B-4E23-ADF7-EC2466F2DEC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "F562D423-0FA7-4300-BF22-A296E137207D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "74941D91-0096-4777-BDBE-B372393A4D73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:trunk.379:*:*:*:*:*:*:*",
"matchCriteriaId": "84DA305C-53E1-493B-9D25-54E4310A0DF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:trunk.380:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB653CC-3D09-473F-A559-4410B9CAB53F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brettle_development:neatupload:trunk.381:*:*:*:*:*:*:*",
"matchCriteriaId": "F5358BDA-7937-451D-959E-704463D1D556"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/25003",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/466404/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/23578",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33785",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/25003",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/466404/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/23578",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33785",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}