René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

96 lines
3.3 KiB
JSON

{
"id": "CVE-2009-3275",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-09-21T19:30:00.547",
"lastModified": "2018-10-10T19:43:25.330",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Blocks/Common/Src/Configuration/Manageability/Adm/AdmContentBuilder.cs in Microsoft patterns & practices Enterprise Library (aka EntLib) allows context-dependent attackers to cause a denial of service (CPU consumption) via an input string composed of many \\ (backslash) characters followed by a \" (double quote), related to a certain regular expression, aka a \"ReDoS\" vulnerability."
},
{
"lang": "es",
"value": "Blocks/Common/Src/Configuration/Manageability/Adm/AdmContentBuilder.cs en Microsoft patterns & practices Enterprise Library (tambi\u00e9n conocido como EntLib) permite a los atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (consumo de CPU) mediante un cadena de entrada compuesta por muchos caracteres \\ (barra invertida) seguidos de un car\u00e1cter \" (comillas dobles\"), relacionado con cierta expresi\u00f3n regular, tambi\u00e9n conocido como vulnerabilidad \"ReDoS\" (Denegaci\u00f3n de servicio mediante expresi\u00f3n regular)."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:enterprise_library:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9A6699-874A-4240-B138-3D9D790A70EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:enterprise_library:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755CF81F-C9B7-4AA8-9EA0-167B096A6801"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:enterprise_library:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9738E2-E5D1-4082-991D-65CF7A5F49CD"
}
]
}
]
}
],
"references": [
{
"url": "http://www.checkmarx.com/Upload/Documents/PDF/Checkmarx_OWASP_IL_2009_ReDoS.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/506419/100/0/threaded",
"source": "cve@mitre.org"
}
]
}