mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
238 lines
7.7 KiB
JSON
238 lines
7.7 KiB
JSON
{
|
|
"id": "CVE-2012-3501",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2012-08-25T10:29:52.630",
|
|
"lastModified": "2024-11-21T01:41:00.513",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The squidclamav_check_preview_handler function in squidclamav.c in SquidClamav 5.x before 5.8 and 6.x before 6.7 passes an unescaped URL to a system command call, which allows remote attackers to cause a denial of service (daemon crash) via a URL with certain characters, as demonstrated using %0D or %0A."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funci\u00f3n squidclamav_check_preview_handler en squidclamav.c en SquidClamav v5.x antes de v5.8 y v6.x antes de v6.7 pasa una URL sin escapar a una llamada de comando del sistema, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una URL con ciertos caracteres, como se demuestra usando %0D o %0A."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7CB4208-C119-447E-A7C0-A90BFB499698"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C153D901-EE91-4F3E-A464-23DFA755A4D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E962A89-690A-400F-9B29-8E2A6FC3D81E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B9CE52F-283E-46FC-83DF-79408B2AC0EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11E37D71-5E81-4526-9E6F-E52162EF840D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:5.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D122E4F9-D9DA-4F67-A37B-37270B279580"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:5.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB6C2F4A-92F2-466F-AA7B-86693C484900"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:5.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B575DE2-DA05-4FA5-8531-2C02F5E826F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "021CE5B8-5366-43E5-8E63-5D6278DF33DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87A102FB-D889-453C-99A4-AE99C09A8573"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "702AC483-3B87-4AC7-8770-7CD3551BFDB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:6.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E48B46D6-1647-41FA-AB7D-2D15B391F0D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FCF8084-8DE0-472D-984A-BDCD696D5D8D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E9D61D0-38F6-4EF2-8E8D-544F485B37C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:darold:squidclamav:6.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3692992-16C8-4607-8D17-7BF2A1675081"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://freecode.com/projects/squidclamav/releases/346722",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/49057",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://squidclamav.darold.net/news.html",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/08/16/2",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/08/16/4",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.osvdb.org/84138",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/54663",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428778",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://freecode.com/projects/squidclamav/releases/346722",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/49057",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://squidclamav.darold.net/news.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/08/16/2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/08/16/4",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.osvdb.org/84138",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/54663",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428778",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |