René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.2 KiB
JSON

{
"id": "CVE-2011-0714",
"sourceIdentifier": "secalert@redhat.com",
"published": "2011-05-04T22:55:02.687",
"lastModified": "2019-04-22T17:48:00.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 might allow remote attackers to cause a denial of service (crash) via malformed data in a packet, related to lockd and the svc_xprt_received function."
},
{
"lang": "es",
"value": "Vulnerabilidad de tipo \"use-after-free\" (usar despu\u00e9s de liberar) en un determinado parche de Red Hat para la funcionalidad de sockets de servidor RPC del kernel de Linux 2.6.32 de Red Hat Enterprise Linux (RHEL) 6. Puede permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de datos mal formados en un paquete. Relacionado con lockd y la funci\u00f3n svc_xprt_received."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.7
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 5.5,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*",
"matchCriteriaId": "46568A0D-F374-4DAB-9B64-FCC74A9AA07B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
}
]
}
]
}
],
"references": [
{
"url": "http://openwall.com/lists/oss-security/2011/03/08/17",
"source": "secalert@redhat.com"
},
{
"url": "http://openwall.com/lists/oss-security/2011/03/09/1",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678144",
"source": "secalert@redhat.com"
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2011-0329.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
}
]
}