2024-12-08 03:06:42 +00:00

151 lines
4.3 KiB
JSON

{
"id": "CVE-2007-2343",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-27T17:19:00.000",
"lastModified": "2024-11-21T00:30:33.307",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the TFTPD component in Enterasys NetSight Console 2.1 and NetSight Inventory Manager 2.1, and possibly earlier, allows remote attackers to execute arbitrary code via crafted request packets that contain long file names."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en el componente TFTPD en Enterasys NetSight Console 2.1 y NetSight Inventory Manager 2.1, y posiblemente anteriores, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de paquetes de respuestas manipuladas que contienen nombres de fichero largos."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enterasys:netsight_console:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1",
"matchCriteriaId": "0C5D3152-F50E-4D21-A452-7A909372E8D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enterasys:netsight_inventory_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1",
"matchCriteriaId": "7D4C8415-E1A6-4CE0-B8E6-59F70575135D"
}
]
}
]
}
],
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=506",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/34627",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/24764",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.enterasys.com/pub/NetSight/Patches/SP1/NetSight_SP1.pdf",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1017876",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1271",
"source": "cve@mitre.org"
},
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=506",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/34627",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/24764",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.enterasys.com/pub/NetSight/Patches/SP1/NetSight_SP1.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1017876",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1271",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}