mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
145 lines
4.4 KiB
JSON
145 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2005-2250",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-07-13T04:00:00.000",
|
|
"lastModified": "2008-09-05T20:51:16.677",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in Bluetooth FTP client (BTFTP) in Nokia Affix 2.1.2 and 3.2.0 allows remote attackers to execute arbitrary code via a long filename in an OBEX file share."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer en Bluetooth FTP client (BTFTP) en Nokia Affix 2.1.2 and 3.2.0 permite que atacantes remotos ejecuten c\u00f3digo arbitrario mediante un nombre de fichero largo en un recurso compartido OBEX."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57AA1BEB-B2F9-4FF0-B606-677C15C3F5AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DF228751-7CC7-46CC-A2B5-CFE47F6D5A69"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13689EDD-8324-4377-92BF-88F50810D90F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A53918FB-12AD-42CA-823B-C2830BE99EE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0626DDC-4FD6-484D-83CB-92B61CDD053B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B53EDC5B-8B67-4F93-90C8-17721F02A1CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:2.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "509BB72F-0689-46B9-85F1-9B7C4AD7F847"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4075DD71-E0F8-40FF-88FF-11289200743F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9F504D8-C1BB-47AA-AF41-3AC8ABB17E8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nokia:affix:3.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F15F9E16-A1B4-4B5B-975E-E9969C41B5E2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://affix.sourceforge.net/affix_212_sec.patch",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2005/dsa-762",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.digitalmunition.com/DMA%5B2005-0712a%5D.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/14230",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |