2024-07-14 02:06:08 +00:00

94 lines
3.6 KiB
JSON

{
"id": "CVE-2007-2079",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-18T03:19:00.000",
"lastModified": "2017-10-11T01:32:05.830",
"vulnStatus": "Modified",
"cveTags": [],
"evaluatorImpact": "Failed exploit attempts will likely crash the webserver, denying service to legitimate users. Additionally, this issue is remotely exploitable only if the installation is not secured as described in the manual.",
"descriptions": [
{
"lang": "en",
"value": "The ADONewConnection Connect function in adodb.php in XAMPP 1.6.0a and earlier for Windows uses untrusted input for the database server hostname, which allows remote attackers to trigger a library buffer overflow and execute arbitrary code via a long host parameter, or have other unspecified impact. NOTE: it could be argued that this is an issue in mssql_connect (CVE-2007-1411.1) in PHP, or an issue in the ADOdb Library, and the proper fix should be in one of these products; if so, then this should not be treated as a vulnerability in XAMPP."
},
{
"lang": "es",
"value": "La funci\u00f3n ADONewConnection Connect en adodb.php de XAMPP 1.6.0a y anteriores para Windows utiliza una entrada que no es de confianza para el nombre de la m\u00e1quina servidora de base de datos, lo cual permite a atacantes remotos provocar un desbordamiento de b\u00fafer de librer\u00eda y ejecutar c\u00f3digo de su elecci\u00f3n mediante par\u00e1metro host largo, o tener otro impacto desconocido. NOTA: se podr\u00eda argumentar que este asunto es relativo a mssql_connect (CVE-2007-1411.1) en PHP, o a la librer\u00eda ADOdb, y la soluci\u00f3n adecuada deber\u00eda estar en uno de estos productos; si as\u00ed fuera, esta no deber\u00eda ser tratada como una vulnerabilidad en XAMPP."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xampp:apache_distribution:*:*:windows:*:*:*:*:*",
"versionEndIncluding": "1.6.0a",
"matchCriteriaId": "ACAB22B5-2307-46EC-ADE3-5974AD96FA52"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/41594",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/23491",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33683",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/3738",
"source": "cve@mitre.org"
}
]
}