René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

82 lines
2.7 KiB
JSON

{
"id": "CVE-2003-1580",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-02-05T22:30:02.030",
"lastModified": "2010-02-08T05:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, uses a logging format that does not identify whether a dotted quad represents an unresolved IP address, which allows remote attackers to spoof IP addresses via crafted DNS responses containing numerical top-level domains, as demonstrated by a forged 123.123.123.123 domain name, related to an \"Inverse Lookup Log Corruption (ILLC)\" issue."
},
{
"lang": "es",
"value": "El servidor Apache HTTP v2.0.44, cuando la resoluci\u00f3n DNS es activada para direcciones IP de clientes, usa un formato de registro que no identifica si un punto cuadrado representa una direcci\u00f3n IP sin resolver, lo que permite a atacantes remotos falsificar direcciones IP a trav\u00e9s de respuestas DNS manipuladas que contiene dominios num\u00e9ricos de alto nivel, como qued\u00f3 demostrado por el nombre de dominio falsifcado 123.123.123.123, relacionado con el tema \"Inverse Lookup Log Corruption (ILLC)\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "19F34D08-430E-4331-A27D-667149425176"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/313867",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}