René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

195 lines
6.3 KiB
JSON

{
"id": "CVE-2006-4901",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-22T22:07:00.000",
"lastModified": "2021-04-09T16:21:30.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, and eTrust Audit 1.5 and r8, allows remote attackers to spoof alerts and conduct replay attacks by invoking eTSAPISend.exe with the desired arguments."
},
{
"lang": "es",
"value": "Computer Associates (CA) eTrust Security Command Center 1.0 y r8 hasta SP1 CR2, y eTrust Audit 1.5 y r8, permite a un atacante remoto suplantar alertas y gu\u00edar ataques de repetici\u00f3n a trav\u00e9s de la invocaci\u00f3n de eTSAPISend.exe con los argumentos deseados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_client:1.5:sp2:*:*:*:*:*:*",
"matchCriteriaId": "AADF88C7-8F85-4FA9-82DD-4896404A92C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_client:1.5:sp3:*:*:*:*:*:*",
"matchCriteriaId": "315F1B77-C655-4131-87DA-EBC171FEDEC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_client:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "555B7B8E-8047-4890-810D-DECDFC730BC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:1.5:sp2:*:*:*:*:*:*",
"matchCriteriaId": "209DFBD5-5E38-42A1-945D-4879C5FAFDE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:1.5:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3DDC23AF-EEC3-4DF9-8EC6-A7B094224EDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_datatools:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB1A4631-D677-468C-9A31-DD5C4BBDDF28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:1.5:sp2:*:*:*:*:*:*",
"matchCriteriaId": "25AEF3E6-1113-41A5-9357-96F8374C4A7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:1.5:sp3:*:*:*:*:*:*",
"matchCriteriaId": "2749B665-DA7F-4F6A-9F52-3A4D0A10BAFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_audit_policy_manager:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AD8658-B2BB-4E60-8EAA-7B491F2D6027"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C363D8B-1022-4C2A-BEDE-34EAB274D9D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:*:*:*:*:*:*:*",
"matchCriteriaId": "BB8C8321-1BE6-476D-910E-6BBDBE683309"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr1:*:*:*:*:*",
"matchCriteriaId": "054689EB-D43E-4C0F-B504-FE615607332A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr2:*:*:*:*:*",
"matchCriteriaId": "40DC453F-12F6-4D51-ADFF-71D2628F3CD8"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1016909",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016910",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/446611/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/446716/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/20139",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3738",
"source": "cve@mitre.org"
},
{
"url": "http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34618",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29107",
"source": "cve@mitre.org"
}
]
}