2024-12-08 03:06:42 +00:00

277 lines
9.6 KiB
JSON

{
"id": "CVE-2004-0226",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-08-18T04:00:00.000",
"lastModified": "2024-11-20T23:48:02.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en Midnight Commander (mc) anteriores a 4.6.0 pueden permitir a atacantes causar una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*",
"matchCriteriaId": "EB4028BE-4173-4175-B9EF-A85A47476A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FC64619A-D8C3-4613-9A51-849DC65DC959"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0A4BBBE0-E96D-4BCB-BF5B-673888C00AC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*",
"matchCriteriaId": "D410B4E1-DA7A-4F62-A0F9-E8C5A147BD45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*",
"matchCriteriaId": "949399A7-6E77-4F12-86EE-7B6FBAA16D4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE8085F-84F3-4305-A52B-FEFF05E9FD17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*",
"matchCriteriaId": "D5DA21F1-8700-437C-8D64-70D97A508598"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*",
"matchCriteriaId": "B03CA3A4-86E2-4E10-8F56-51B814F51540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AA5CCF-F160-4092-A7E7-29459E2528F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*",
"matchCriteriaId": "F2B90B64-72A2-46D3-A6CC-07052FC70740"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7739C2-C590-479E-8A0B-2EC95E836E3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*",
"matchCriteriaId": "25C1FE96-BC31-48D3-BB64-F132E17B8244"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFFA28E-B2EA-4F1A-8A05-7F2B05572B99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*",
"matchCriteriaId": "E5969E22-C2B8-4440-92D0-EF17ECFECFCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "98D27DF4-BCF6-4AB8-9117-80E2D1072C6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "26430687-409B-448F-934B-06AB937DDF63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "980553F2-8662-47CF-95F0-645141746AEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "40EBF1CD-B392-4262-8F06-2C784ADAF0F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9C00F84A-FCD4-4935-B7DE-ECBA6AE9B074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "960DC6C2-B285-41D4-96F7-ED97F8BD5482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "57772E3B-893C-408A-AA3B-78C972ED4D5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F432C6C2-8676-4DD5-B9E6-71F6C164EF9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "300A6A65-05FD-401C-80F6-B5F5B1F056E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3D53C9-3806-45E6-8AE9-7D41280EF64C"
}
]
}
]
}
],
"references": [
{
"url": "http://security.gentoo.org/glsa/glsa-200405-21.xml",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2004/dsa-497",
"source": "cve@mitre.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:039",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2004_12_mc.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-172.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16016",
"source": "cve@mitre.org"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200405-21.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.debian.org/security/2004/dsa-497",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:039",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.novell.com/linux/security/advisories/2004_12_mc.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-172.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16016",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}