2024-12-08 03:06:42 +00:00

202 lines
7.5 KiB
JSON

{
"id": "CVE-2012-4551",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-11-30T22:55:01.550",
"lastModified": "2024-11-21T01:43:07.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in libunity-webapps before 2.4.1 allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted web site, related to \"certain hash tables.\""
},
{
"lang": "es",
"value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en libunity-webapps antes de v2.4.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un sitio web modificado, en relaci\u00f3n con \"ciertas tablas hash\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.4.0",
"matchCriteriaId": "47B7CFBA-31C8-470E-A18A-880B52EF5DA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:0.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D1F49165-80B8-4151-B0E5-51B6ED8E032F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "130CB642-21AC-4929-847F-76D9B917F368"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A771A13-5749-4C37-9190-A6CD15C3B6CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B593C75D-0356-4F8E-9EDB-47C007B20F41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A00C2101-E822-4725-AC15-B87B04C8BAC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "742A65FE-13E4-4419-B6D8-156DC1AB71FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC5700D-2526-4E83-AC15-B63B2B0A5DE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "93465EAA-55D2-40A7-8639-DFA0B855B980"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A65D340A-9B8B-4694-88DC-A7BFA905548E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7D124800-C155-4F84-A115-970BD0CB2E7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D1440637-2425-493E-AE9D-226615B2B384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D3DCFB-8285-4C7D-B2D8-FEA1FED0B4DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FEAA1725-7671-4A2A-B99D-86ECEF4D1D43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2A5DA396-498F-4EA2-A133-B86FB3C5F1A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9C812E-A01F-4683-BF1F-56BBBC236982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA0DA0F-25F9-4CEA-B11C-AE26581E9E5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C2075FD1-E2E5-4C69-87DA-EFA5E0907309"
}
]
}
]
}
],
"references": [
{
"url": "http://bazaar.launchpad.net/~webapps/libunity-webapps/trunk/revision/815",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/29/3",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/56314",
"source": "secalert@redhat.com"
},
{
"url": "http://www.ubuntu.com/usn/USN-1635-1",
"source": "secalert@redhat.com"
},
{
"url": "https://bugs.launchpad.net/ubuntu/%2Bsource/libunity-webapps/%2Bbug/1068495",
"source": "secalert@redhat.com"
},
{
"url": "http://bazaar.launchpad.net/~webapps/libunity-webapps/trunk/revision/815",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/10/29/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/56314",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ubuntu.com/usn/USN-1635-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugs.launchpad.net/ubuntu/%2Bsource/libunity-webapps/%2Bbug/1068495",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}