mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
180 lines
6.0 KiB
JSON
180 lines
6.0 KiB
JSON
{
|
|
"id": "CVE-2014-3443",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2014-05-14T19:55:13.217",
|
|
"lastModified": "2014-05-15T18:55:56.570",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "JetMPAd.ax in JetAudio 8.1.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted .ogg file."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "JetMPAd.ax en JetAudio 8.1.1 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un archivo .ogg manipulado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "8.1.1",
|
|
"matchCriteriaId": "50E3D064-105E-4A8D-BB48-C809190DA829"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD3911B5-9866-4CE7-AD88-C5F4F8CF1EFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B03578C-E19B-47BA-8757-566E72E9B34A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "148C2A9D-F3BB-4E7E-B516-0D223EC4D080"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CAD252AC-FD66-4AD6-9F21-8EFDE1EA2CA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9EF854D9-1EE1-4369-B73B-6C9B51242F24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91435392-7790-46F1-A4A0-8388E2DE57E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E09DC6B-B87C-4A00-B717-823B1B5BA4B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.7.1000:-:basic:*:*:*:*:*",
|
|
"matchCriteriaId": "B9D72284-5855-4DD2-A765-638C79F5380D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA0A596E-5C7C-43A3-AF06-2322368876E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26E67CCF-67FF-4E5D-9753-459AB9B1019E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D423BB42-1852-4D94-98B1-6847544A2A96"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B0EFBB5B-DE96-4956-B6E8-39AD5B706E7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8ADAC449-5E54-4955-868C-8B7022F133A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E8F14BB-EA84-43EB-BD73-2E9214D3DF79"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9EA7ABB-A6B8-4DDD-BA82-FA3B12E8B190"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EFFC53A5-8343-43E0-A54D-50FCD4B6C97F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.0.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E8750B9-FC2E-49FD-AFEC-E3537023276B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jetaudio:jetaudio:8.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBFE87DA-7465-4B66-8DD7-3E72C82771AE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/33332",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/67319",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
}
|
|
]
|
|
} |