René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

247 lines
8.3 KiB
JSON

{
"id": "CVE-2014-0467",
"sourceIdentifier": "security@debian.org",
"published": "2014-03-14T15:55:05.637",
"lastModified": "2018-10-30T16:27:34.687",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en copy.c en Mutt anterior a 1.5.23 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una l\u00ednea de cabecera RFC2047 manipulada, relacionado con la expansi\u00f3n de direcci\u00f3n."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5.22",
"matchCriteriaId": "FA6A52BC-0914-4D26-BB4B-FB81621582B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8C9BFED5-6D19-4B2E-8F1E-8262C908F1C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A82602-1948-47C8-8F55-58B2BC602DD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "704F1CE0-6A42-42D9-A5EA-DA385D9C437A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6AA1A4E0-9405-408C-B15B-D9FDB797081A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A3FCC90B-E7EB-4467-90BE-6A75489DF719"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D55642D8-06F7-4274-ABF1-6EA9EC8E22BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E55271CE-1724-46F7-8E97-FD9D918ED4F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "22ED4127-38FF-4271-A443-9C5ED0C9A5AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2F8A1007-8993-4637-9DC6-2D1FF4216FC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F4234D39-57E4-4C90-A1C2-23F08801CF74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3E9C0F76-89D9-483A-8EF6-638C4B2FE1DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "98E2B705-7739-4671-9D34-6644BA85FF03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "74C786A0-E910-4C49-B0CC-FAD26E7141D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E70B1F82-CD76-4204-BBAD-56447CB759ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "0AC099BE-9FD3-4B1C-9DC8-2C3C553C617C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD01EFC-261E-4F3E-8A5A-FD2A53BF1A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD5E120-7D45-4B4F-A97F-69EF1A07C137"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "11DAD8B2-2DE4-43C0-B425-7F9D6E6BE40A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF70DC6-9B24-4E48-B917-11FF64F751F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "89C33B31-B9BC-4E43-8221-219380B4B682"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "591AA471-643C-49FB-8922-F91774946177"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutt:mutt:1.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "925C4B83-A399-4DF1-BCAE-45EEAF522371"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html",
"source": "security@debian.org"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html",
"source": "security@debian.org"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html",
"source": "security@debian.org"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2014-0304.html",
"source": "security@debian.org"
},
{
"url": "http://www.debian.org/security/2014/dsa-2874",
"source": "security@debian.org"
},
{
"url": "http://www.mutt.org/doc/devel/ChangeLog",
"source": "security@debian.org"
},
{
"url": "http://www.securityfocus.com/bid/66165",
"source": "security@debian.org"
},
{
"url": "http://www.securitytracker.com/id/1029919",
"source": "security@debian.org"
},
{
"url": "http://www.ubuntu.com/usn/USN-2147-1",
"source": "security@debian.org"
}
]
}