mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
277 lines
9.8 KiB
JSON
277 lines
9.8 KiB
JSON
{
|
|
"id": "CVE-2011-0975",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-02-10T18:00:59.177",
|
|
"lastModified": "2018-10-09T19:30:00.673",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer basado en pila en BMC PATROL Agent Service Daemon para Servers, Performance Assurance para Servers, Performance Assurance para Virtual Servers desde v7.4.00 hasta v7.5.10; Performance Analyzer y Performance Predictor para Servers desde v7.4.00 hasta v7.5.10; y Capacity Management Essentials v1.2.00 (v7.4.15) permite a atacantes remotos ejecutar c\u00f3digo arbitrario manipulando la longitud de un valor en un comando BGS_MULTIPLE_READS para el puerto 6768 TCP."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.4.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B422BE5-4ACE-4674-ADD0-AFB50706ACC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "930A4995-F9CD-4975-8DF1-1A4FC5917262"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.4.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D0A7699-FC89-4763-972B-B8069BC7B5ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.5.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BCFBBF0-486F-463B-80DF-BE5DC586EFAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.5.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7FCB969B-774A-4498-A428-AA01D1C24348"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.4.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25A2C5D0-03CD-4FA7-A385-116FF699BAC5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21791D02-2722-4503-A1D7-D357019299B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.4.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "541C07AB-BFA3-4184-AE49-9758CF4D249B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.5.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1D569E6-3D56-4DA6-8E9C-5EFC98D2F770"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.5.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1DAE0145-BA65-4C1A-85D1-F2EA31F96DFD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.4.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0C53FC8-4544-4D55-9860-C43EE4BB8BE0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B759720-4180-4676-93A0-26546171B198"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.4.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A36225B-0C26-4397-B196-B8C482132912"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.5.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A45A8BE9-3DEA-44DE-A9FE-C01BC6E709C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.5.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1ED998E2-951D-4F44-8EBB-ACF55FEE40C5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.4.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A298EE49-1BA1-4B9F-A1FF-63CE8F04C53F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12078E14-6C7E-4421-B354-E7C7493E8CF0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.4.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE48A1B0-2CD9-44CE-A1D0-3C8A1904DD26"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.5.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "142D71CC-624A-45F1-B5F7-81E81B98BF88"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.5.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86B1B81A-9EDC-498F-BC2E-3CC363F18CDF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.4.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0A9A864-A622-4B7B-9EE7-0A8BC01AEF55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "669458F8-5646-42EB-9FDC-3AC8EAF4CA4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.4.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EFFA35D9-A3A9-4827-AC14-3CF55AE24A8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.5.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "816ECAF2-4702-49C7-A6C0-7453669F4FFF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.5.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76342206-796D-4BCE-856B-FC2112A0EC00"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:bmc:capacity_management_essentials:1.2.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50B5CDA8-B399-4CDE-98F2-4EE4A0D704EC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8076",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/516188/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/46151",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0286",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-039",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65135",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |