mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
140 lines
4.5 KiB
JSON
140 lines
4.5 KiB
JSON
{
|
|
"id": "CVE-2009-2026",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-08-10T18:30:00.297",
|
|
"lastModified": "2018-10-10T19:39:16.053",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Stack-based buffer overflow in a token searching function in the dtscore library in Data Transport Services in CA Software Delivery r11.2 C1, C2, C3, and SP4; Unicenter Software Delivery 4.0 C3; CA Advantage Data Transport 3.0 C1; and CA IT Client Manager r12 allows remote attackers to execute arbitrary code via crafted data."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n de b\u00fasqueda de \"token\" (testigo) en la librer\u00eda dtscore de los servicios Data Transport Services de CA Software Delivery r11.2 C1, C2, C3, y SP4; Unicenter Software Delivery 4.0 C3; CA Advantage Data Transport 3.0 C1; y CA IT Client Manager r12."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:advantage_data_transport:3.0:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E6409A3-4F03-4CED-9A2E-2DE7B5EE624E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:it_client_manager:r12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C31688D4-1C99-4764-A913-564E0FEB1E9D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:software_delivery:r11:c1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E14834E-9E56-4036-B89C-E6F0E6775E34"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:software_delivery:r11:c2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F59A43E7-02A9-4656-A4C4-FE01DCE5E615"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:software_delivery:r11:c3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3DE142E-A7C8-4280-9677-AE167FA3ACF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:software_delivery:r11:sp4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4FD0F14E-A31D-4A2C-A464-A7DAC1CB2180"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ca:unicenter_software_delivery:4.0:c3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D546AF2C-34D9-4C7A-A2F1-F766D1CAA3E2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securitytracker.com/id?1022688",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/505557/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/35984",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/2195",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-052/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52322",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214090",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |