2024-12-08 03:06:42 +00:00

238 lines
7.7 KiB
JSON

{
"id": "CVE-2012-3501",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-08-25T10:29:52.630",
"lastModified": "2024-11-21T01:41:00.513",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The squidclamav_check_preview_handler function in squidclamav.c in SquidClamav 5.x before 5.8 and 6.x before 6.7 passes an unescaped URL to a system command call, which allows remote attackers to cause a denial of service (daemon crash) via a URL with certain characters, as demonstrated using %0D or %0A."
},
{
"lang": "es",
"value": "La funci\u00f3n squidclamav_check_preview_handler en squidclamav.c en SquidClamav v5.x antes de v5.8 y v6.x antes de v6.7 pasa una URL sin escapar a una llamada de comando del sistema, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una URL con ciertos caracteres, como se demuestra usando %0D o %0A."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CB4208-C119-447E-A7C0-A90BFB499698"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C153D901-EE91-4F3E-A464-23DFA755A4D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3E962A89-690A-400F-9B29-8E2A6FC3D81E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B9CE52F-283E-46FC-83DF-79408B2AC0EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "11E37D71-5E81-4526-9E6F-E52162EF840D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D122E4F9-D9DA-4F67-A37B-37270B279580"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AB6C2F4A-92F2-466F-AA7B-86693C484900"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8B575DE2-DA05-4FA5-8531-2C02F5E826F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "021CE5B8-5366-43E5-8E63-5D6278DF33DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87A102FB-D889-453C-99A4-AE99C09A8573"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "702AC483-3B87-4AC7-8770-7CD3551BFDB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E48B46D6-1647-41FA-AB7D-2D15B391F0D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1FCF8084-8DE0-472D-984A-BDCD696D5D8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9D61D0-38F6-4EF2-8E8D-544F485B37C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:darold:squidclamav:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3692992-16C8-4607-8D17-7BF2A1675081"
}
]
}
]
}
],
"references": [
{
"url": "http://freecode.com/projects/squidclamav/releases/346722",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/49057",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://squidclamav.darold.net/news.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/16/2",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/16/4",
"source": "secalert@redhat.com"
},
{
"url": "http://www.osvdb.org/84138",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/54663",
"source": "secalert@redhat.com"
},
{
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428778",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://freecode.com/projects/squidclamav/releases/346722",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/49057",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://squidclamav.darold.net/news.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/16/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/08/16/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/84138",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/54663",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428778",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
}
]
}