Vulnerabilites related to ubuntu - ubuntu_linux
CVE-2004-1235 (GCVE-0-2004-1235)
Vulnerability from cvelistv5
Published
2005-01-20 05:00
Modified
2024-08-08 00:46
Severity ?
Summary
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
References
http://secunia.com/advisories/20163third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1082vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022vendor-advisory, x_refsource_MANDRAKE
http://www.redhat.com/support/errata/RHSA-2005-017.htmlvendor-advisory, x_refsource_REDHAT
https://bugzilla.fedora.us/show_bug.cgi?id=2336vendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/advisories/7804x_refsource_CONFIRM
http://isec.pl/vulnerabilities/isec-0021-uselib.txtx_refsource_MISC
http://www.debian.org/security/2006/dsa-1070vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2005-016.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/20162third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2005-043.htmlvendor-advisory, x_refsource_REDHAT
http://www.trustix.org/errata/2005/0001/vendor-advisory, x_refsource_TRUSTIX
http://www.redhat.com/support/errata/RHSA-2005-092.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2006/dsa-1067vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/advisories/7805vendor-advisory, x_refsource_FEDORA
http://www.debian.org/security/2006/dsa-1069vendor-advisory, x_refsource_DEBIAN
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930vendor-advisory, x_refsource_CONECTIVA
http://www.novell.com/linux/security/advisories/2005_01_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/12190vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/18800vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=110512575901427&w=2mailing-list, x_refsource_BUGTRAQ
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/advisories/7806vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/20202third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20338third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:46:12.034Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20163",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20163",
               },
               {
                  name: "DSA-1082",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1082",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "RHSA-2005:017",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
               },
               {
                  name: "FLSA:2336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/advisories/7804",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt",
               },
               {
                  name: "DSA-1070",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1070",
               },
               {
                  name: "RHSA-2005:016",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
               },
               {
                  name: "20162",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20162",
               },
               {
                  name: "RHSA-2005:043",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-043.html",
               },
               {
                  name: "2005-0001",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2005/0001/",
               },
               {
                  name: "RHSA-2005:092",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
               },
               {
                  name: "DSA-1067",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1067",
               },
               {
                  name: "FEDORA-2005-014",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/advisories/7805",
               },
               {
                  name: "DSA-1069",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1069",
               },
               {
                  name: "CLA-2005:930",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
               },
               {
                  name: "SUSE-SR:2005:001",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
               },
               {
                  name: "12190",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/12190",
               },
               {
                  name: "linux-uselib-gain-privileges(18800)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800",
               },
               {
                  name: "20050107 Linux kernel sys_uselib local root vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2",
               },
               {
                  name: "oval:org.mitre.oval:def:9567",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567",
               },
               {
                  name: "FEDORA-2005-013",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/advisories/7806",
               },
               {
                  name: "20202",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20202",
               },
               {
                  name: "20338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20338",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-01-07T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20163",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20163",
            },
            {
               name: "DSA-1082",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1082",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "RHSA-2005:017",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
            },
            {
               name: "FLSA:2336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.securityfocus.com/advisories/7804",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt",
            },
            {
               name: "DSA-1070",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1070",
            },
            {
               name: "RHSA-2005:016",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
            },
            {
               name: "20162",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20162",
            },
            {
               name: "RHSA-2005:043",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-043.html",
            },
            {
               name: "2005-0001",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2005/0001/",
            },
            {
               name: "RHSA-2005:092",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
            },
            {
               name: "DSA-1067",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1067",
            },
            {
               name: "FEDORA-2005-014",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/advisories/7805",
            },
            {
               name: "DSA-1069",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1069",
            },
            {
               name: "CLA-2005:930",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
            },
            {
               name: "SUSE-SR:2005:001",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
            },
            {
               name: "12190",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/12190",
            },
            {
               name: "linux-uselib-gain-privileges(18800)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800",
            },
            {
               name: "20050107 Linux kernel sys_uselib local root vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2",
            },
            {
               name: "oval:org.mitre.oval:def:9567",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567",
            },
            {
               name: "FEDORA-2005-013",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/advisories/7806",
            },
            {
               name: "20202",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20202",
            },
            {
               name: "20338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20338",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1235",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20163",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20163",
                  },
                  {
                     name: "DSA-1082",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1082",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "RHSA-2005:017",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
                  },
                  {
                     name: "FLSA:2336",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
                  },
                  {
                     name: "http://www.securityfocus.com/advisories/7804",
                     refsource: "CONFIRM",
                     url: "http://www.securityfocus.com/advisories/7804",
                  },
                  {
                     name: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt",
                     refsource: "MISC",
                     url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt",
                  },
                  {
                     name: "DSA-1070",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1070",
                  },
                  {
                     name: "RHSA-2005:016",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
                  },
                  {
                     name: "20162",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20162",
                  },
                  {
                     name: "RHSA-2005:043",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-043.html",
                  },
                  {
                     name: "2005-0001",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2005/0001/",
                  },
                  {
                     name: "RHSA-2005:092",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
                  },
                  {
                     name: "DSA-1067",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1067",
                  },
                  {
                     name: "FEDORA-2005-014",
                     refsource: "FEDORA",
                     url: "http://www.securityfocus.com/advisories/7805",
                  },
                  {
                     name: "DSA-1069",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1069",
                  },
                  {
                     name: "CLA-2005:930",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
                  },
                  {
                     name: "SUSE-SR:2005:001",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
                  },
                  {
                     name: "12190",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/12190",
                  },
                  {
                     name: "linux-uselib-gain-privileges(18800)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800",
                  },
                  {
                     name: "20050107 Linux kernel sys_uselib local root vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9567",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567",
                  },
                  {
                     name: "FEDORA-2005-013",
                     refsource: "FEDORA",
                     url: "http://www.securityfocus.com/advisories/7806",
                  },
                  {
                     name: "20202",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20202",
                  },
                  {
                     name: "20338",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20338",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1235",
      datePublished: "2005-01-20T05:00:00",
      dateReserved: "2004-12-15T00:00:00",
      dateUpdated: "2024-08-08T00:46:12.034Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0106 (GCVE-0-2005-0106)
Vulnerability from cvelistv5
Published
2005-05-03 04:00
Modified
2024-08-07 20:57
Severity ?
Summary
SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.
References
https://usn.ubuntu.com/113-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/18639third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:023vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/13471vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T20:57:41.236Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-113-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/113-1/",
               },
               {
                  name: "18639",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18639",
               },
               {
                  name: "MDKSA-2006:023",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023",
               },
               {
                  name: "13471",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/13471",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-05-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-113-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/113-1/",
            },
            {
               name: "18639",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18639",
            },
            {
               name: "MDKSA-2006:023",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023",
            },
            {
               name: "13471",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/13471",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-0106",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-113-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/113-1/",
                  },
                  {
                     name: "18639",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18639",
                  },
                  {
                     name: "MDKSA-2006:023",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023",
                  },
                  {
                     name: "13471",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/13471",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-0106",
      datePublished: "2005-05-03T04:00:00",
      dateReserved: "2005-01-18T00:00:00",
      dateUpdated: "2024-08-07T20:57:41.236Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2009-0365 (GCVE-0-2009-0365)
Vulnerability from cvelistv5
Published
2009-03-05 02:00
Modified
2024-08-07 04:31
Severity ?
Summary
nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.
References
http://securitytracker.com/id?1021910vdb-entry, x_refsource_SECTRACK
http://www.ubuntu.com/usn/USN-727-1vendor-advisory, x_refsource_UBUNTU
http://www.ubuntu.com/usn/USN-727-2vendor-advisory, x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/49062vdb-entry, x_refsource_XF
http://www.securitytracker.com/id?1021908vdb-entry, x_refsource_SECTRACK
http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207x_refsource_CONFIRM
http://www.securityfocus.com/bid/33966vdb-entry, x_refsource_BID
http://securitytracker.com/id?1021911vdb-entry, x_refsource_SECTRACK
https://bugzilla.redhat.com/show_bug.cgi?id=487722x_refsource_CONFIRM
http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/34067third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2009-0362.htmlvendor-advisory, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=487752x_refsource_CONFIRM
http://www.debian.org/security/2009/dsa-1955vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.htmlvendor-advisory, x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2009-0361.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/34177third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/34473third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T04:31:26.156Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1021910",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1021910",
               },
               {
                  name: "USN-727-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-727-1",
               },
               {
                  name: "USN-727-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-727-2",
               },
               {
                  name: "networkmanager-dbus-info-disclosure(49062)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062",
               },
               {
                  name: "1021908",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1021908",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207",
               },
               {
                  name: "33966",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/33966",
               },
               {
                  name: "1021911",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1021911",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207",
               },
               {
                  name: "oval:org.mitre.oval:def:10828",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828",
               },
               {
                  name: "34067",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34067",
               },
               {
                  name: "RHSA-2009:0362",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
               },
               {
                  name: "DSA-1955",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2009/dsa-1955",
               },
               {
                  name: "SUSE-SR:2009:009",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
               },
               {
                  name: "SUSE-SA:2009:013",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
               },
               {
                  name: "RHSA-2009:0361",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
               },
               {
                  name: "34177",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34177",
               },
               {
                  name: "34473",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34473",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2009-03-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1021910",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1021910",
            },
            {
               name: "USN-727-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-727-1",
            },
            {
               name: "USN-727-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-727-2",
            },
            {
               name: "networkmanager-dbus-info-disclosure(49062)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062",
            },
            {
               name: "1021908",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1021908",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207",
            },
            {
               name: "33966",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/33966",
            },
            {
               name: "1021911",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1021911",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207",
            },
            {
               name: "oval:org.mitre.oval:def:10828",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828",
            },
            {
               name: "34067",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34067",
            },
            {
               name: "RHSA-2009:0362",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
            },
            {
               name: "DSA-1955",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2009/dsa-1955",
            },
            {
               name: "SUSE-SR:2009:009",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
            },
            {
               name: "SUSE-SA:2009:013",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
            },
            {
               name: "RHSA-2009:0361",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
            },
            {
               name: "34177",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34177",
            },
            {
               name: "34473",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34473",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2009-0365",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1021910",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1021910",
                  },
                  {
                     name: "USN-727-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-727-1",
                  },
                  {
                     name: "USN-727-2",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-727-2",
                  },
                  {
                     name: "networkmanager-dbus-info-disclosure(49062)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062",
                  },
                  {
                     name: "1021908",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1021908",
                  },
                  {
                     name: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207",
                     refsource: "CONFIRM",
                     url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207",
                  },
                  {
                     name: "33966",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/33966",
                  },
                  {
                     name: "1021911",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1021911",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=487722",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722",
                  },
                  {
                     name: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207",
                     refsource: "CONFIRM",
                     url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10828",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828",
                  },
                  {
                     name: "34067",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/34067",
                  },
                  {
                     name: "RHSA-2009:0362",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
                  },
                  {
                     name: "DSA-1955",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2009/dsa-1955",
                  },
                  {
                     name: "SUSE-SR:2009:009",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
                  },
                  {
                     name: "SUSE-SA:2009:013",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
                  },
                  {
                     name: "RHSA-2009:0361",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
                  },
                  {
                     name: "34177",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/34177",
                  },
                  {
                     name: "34473",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/34473",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2009-0365",
      datePublished: "2009-03-05T02:00:00",
      dateReserved: "2009-01-29T00:00:00",
      dateUpdated: "2024-08-07T04:31:26.156Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0957 (GCVE-0-2004-0957)
Vulnerability from cvelistv5
Published
2004-10-21 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/17783vdb-entry, x_refsource_XF
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947vendor-advisory, x_refsource_CONECTIVA
http://www.redhat.com/support/errata/RHSA-2004-611.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2005/dsa-707vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:070vendor-advisory, x_refsource_MANDRAKE
https://www.ubuntu.com/usn/usn-32-1/vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2004-597.htmlvendor-advisory, x_refsource_REDHAT
http://www.ciac.org/ciac/bulletins/p-018.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:48.222Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "mysql-underscore-gain-priv(17783)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783",
               },
               {
                  name: "CLA-2005:947",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
               },
               {
                  name: "RHSA-2004:611",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-611.html",
               },
               {
                  name: "DSA-707",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-707",
               },
               {
                  name: "MDKSA-2005:070",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070",
               },
               {
                  name: "USN-32-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-32-1/",
               },
               {
                  name: "RHSA-2004:597",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-597.html",
               },
               {
                  name: "P-018",
                  tags: [
                     "third-party-advisory",
                     "government-resource",
                     "x_refsource_CIAC",
                     "x_transferred",
                  ],
                  url: "http://www.ciac.org/ciac/bulletins/p-018.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "mysql-underscore-gain-priv(17783)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783",
            },
            {
               name: "CLA-2005:947",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
            },
            {
               name: "RHSA-2004:611",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-611.html",
            },
            {
               name: "DSA-707",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-707",
            },
            {
               name: "MDKSA-2005:070",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070",
            },
            {
               name: "USN-32-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-32-1/",
            },
            {
               name: "RHSA-2004:597",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-597.html",
            },
            {
               name: "P-018",
               tags: [
                  "third-party-advisory",
                  "government-resource",
                  "x_refsource_CIAC",
               ],
               url: "http://www.ciac.org/ciac/bulletins/p-018.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0957",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "mysql-underscore-gain-priv(17783)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783",
                  },
                  {
                     name: "CLA-2005:947",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
                  },
                  {
                     name: "RHSA-2004:611",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-611.html",
                  },
                  {
                     name: "DSA-707",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2005/dsa-707",
                  },
                  {
                     name: "MDKSA-2005:070",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070",
                  },
                  {
                     name: "USN-32-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-32-1/",
                  },
                  {
                     name: "RHSA-2004:597",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-597.html",
                  },
                  {
                     name: "P-018",
                     refsource: "CIAC",
                     url: "http://www.ciac.org/ciac/bulletins/p-018.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0957",
      datePublished: "2004-10-21T04:00:00",
      dateReserved: "2004-10-13T00:00:00",
      dateUpdated: "2024-08-08T00:31:48.222Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-5365 (GCVE-0-2007-5365)
Vulnerability from cvelistv5
Published
2007-10-11 10:00
Modified
2024-08-07 15:31
Severity ?
Summary
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
References
http://secunia.com/advisories/27338third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27350third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/3088vdb-entry, x_refsource_VUPEN
https://www.exploit-db.com/exploits/4601exploit, x_refsource_EXPLOIT-DB
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.cx_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354x_refsource_CONFIRM
http://www.openbsd.org/errata42.html#001_dhcpdvendor-advisory, x_refsource_OPENBSD
http://www.securityfocus.com/bid/25984vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/483230/100/100/threadedmailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/37045vdb-entry, x_refsource_XF
http://www.redhat.com/support/errata/RHSA-2007-0970.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2007/dsa-1388vendor-advisory, x_refsource_DEBIAN
http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962x_refsource_MISC
http://www.ubuntu.com/usn/usn-531-1vendor-advisory, x_refsource_UBUNTU
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817vdb-entry, signature, x_refsource_OVAL
http://www.ubuntu.com/usn/usn-531-2vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/27160third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/482085/100/100/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/27273third-party-advisory, x_refsource_SECUNIA
http://www.openbsd.org/errata40.html#016_dhcpdvendor-advisory, x_refsource_OPENBSD
http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/32668third-party-advisory, x_refsource_SECUNIA
http://www.openbsd.org/errata41.html#010_dhcpdvendor-advisory, x_refsource_OPENBSD
http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1x_refsource_CONFIRM
http://www.securitytracker.com/id?1018794vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1021157vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/32213vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T15:31:57.167Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "27338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27338",
               },
               {
                  name: "27350",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27350",
               },
               {
                  name: "ADV-2008-3088",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/3088",
               },
               {
                  name: "4601",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/4601",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354",
               },
               {
                  name: "[4.2] 20071008 001: SECURITY FIX: October 8, 2007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENBSD",
                     "x_transferred",
                  ],
                  url: "http://www.openbsd.org/errata42.html#001_dhcpd",
               },
               {
                  name: "25984",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/25984",
               },
               {
                  name: "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded",
               },
               {
                  name: "openbsd-dhcp-bo(37045)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045",
               },
               {
                  name: "RHSA-2007:0970",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html",
               },
               {
                  name: "DSA-1388",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2007/dsa-1388",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962",
               },
               {
                  name: "USN-531-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-531-1",
               },
               {
                  name: "oval:org.mitre.oval:def:5817",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817",
               },
               {
                  name: "USN-531-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-531-2",
               },
               {
                  name: "27160",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27160",
               },
               {
                  name: "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSDâ??s DHCP server",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded",
               },
               {
                  name: "27273",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27273",
               },
               {
                  name: "[4.0] 20071008 016: SECURITY FIX: October 8, 2007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENBSD",
                     "x_transferred",
                  ],
                  url: "http://www.openbsd.org/errata40.html#016_dhcpd",
               },
               {
                  name: "243806",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1",
               },
               {
                  name: "32668",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/32668",
               },
               {
                  name: "[4.1] 20071008 010: SECURITY FIX: October 8, 2007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENBSD",
                     "x_transferred",
                  ],
                  url: "http://www.openbsd.org/errata41.html#010_dhcpd",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
               },
               {
                  name: "1018794",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1018794",
               },
               {
                  name: "1021157",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1021157",
               },
               {
                  name: "32213",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/32213",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-10-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-15T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "27338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27338",
            },
            {
               name: "27350",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27350",
            },
            {
               name: "ADV-2008-3088",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/3088",
            },
            {
               name: "4601",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/4601",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354",
            },
            {
               name: "[4.2] 20071008 001: SECURITY FIX: October 8, 2007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENBSD",
               ],
               url: "http://www.openbsd.org/errata42.html#001_dhcpd",
            },
            {
               name: "25984",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/25984",
            },
            {
               name: "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded",
            },
            {
               name: "openbsd-dhcp-bo(37045)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045",
            },
            {
               name: "RHSA-2007:0970",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html",
            },
            {
               name: "DSA-1388",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2007/dsa-1388",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962",
            },
            {
               name: "USN-531-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-531-1",
            },
            {
               name: "oval:org.mitre.oval:def:5817",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817",
            },
            {
               name: "USN-531-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-531-2",
            },
            {
               name: "27160",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27160",
            },
            {
               name: "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSDâ??s DHCP server",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded",
            },
            {
               name: "27273",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27273",
            },
            {
               name: "[4.0] 20071008 016: SECURITY FIX: October 8, 2007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENBSD",
               ],
               url: "http://www.openbsd.org/errata40.html#016_dhcpd",
            },
            {
               name: "243806",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1",
            },
            {
               name: "32668",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/32668",
            },
            {
               name: "[4.1] 20071008 010: SECURITY FIX: October 8, 2007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENBSD",
               ],
               url: "http://www.openbsd.org/errata41.html#010_dhcpd",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
            },
            {
               name: "1018794",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1018794",
            },
            {
               name: "1021157",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1021157",
            },
            {
               name: "32213",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/32213",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-5365",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "27338",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/27338",
                  },
                  {
                     name: "27350",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/27350",
                  },
                  {
                     name: "ADV-2008-3088",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/3088",
                  },
                  {
                     name: "4601",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/4601",
                  },
                  {
                     name: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c",
                     refsource: "CONFIRM",
                     url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c",
                  },
                  {
                     name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354",
                     refsource: "CONFIRM",
                     url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354",
                  },
                  {
                     name: "[4.2] 20071008 001: SECURITY FIX: October 8, 2007",
                     refsource: "OPENBSD",
                     url: "http://www.openbsd.org/errata42.html#001_dhcpd",
                  },
                  {
                     name: "25984",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/25984",
                  },
                  {
                     name: "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded",
                  },
                  {
                     name: "openbsd-dhcp-bo(37045)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045",
                  },
                  {
                     name: "RHSA-2007:0970",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html",
                  },
                  {
                     name: "DSA-1388",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2007/dsa-1388",
                  },
                  {
                     name: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962",
                     refsource: "MISC",
                     url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962",
                  },
                  {
                     name: "USN-531-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-531-1",
                  },
                  {
                     name: "oval:org.mitre.oval:def:5817",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817",
                  },
                  {
                     name: "USN-531-2",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-531-2",
                  },
                  {
                     name: "27160",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/27160",
                  },
                  {
                     name: "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSDâ??s DHCP server",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded",
                  },
                  {
                     name: "27273",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/27273",
                  },
                  {
                     name: "[4.0] 20071008 016: SECURITY FIX: October 8, 2007",
                     refsource: "OPENBSD",
                     url: "http://www.openbsd.org/errata40.html#016_dhcpd",
                  },
                  {
                     name: "243806",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1",
                  },
                  {
                     name: "32668",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/32668",
                  },
                  {
                     name: "[4.1] 20071008 010: SECURITY FIX: October 8, 2007",
                     refsource: "OPENBSD",
                     url: "http://www.openbsd.org/errata41.html#010_dhcpd",
                  },
                  {
                     name: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
                     refsource: "CONFIRM",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
                  },
                  {
                     name: "1018794",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1018794",
                  },
                  {
                     name: "1021157",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1021157",
                  },
                  {
                     name: "32213",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/32213",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-5365",
      datePublished: "2007-10-11T10:00:00",
      dateReserved: "2007-10-10T00:00:00",
      dateUpdated: "2024-08-07T15:31:57.167Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-1351 (GCVE-0-2007-1351)
Vulnerability from cvelistv5
Published
2007-04-06 01:00
Modified
2024-08-07 12:50
Severity ?
Summary
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
References
http://www.redhat.com/support/errata/RHSA-2007-0150.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24745third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24921third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/33937third-party-advisory, x_refsource_SECUNIA
http://www.trustix.org/errata/2007/0013/vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/24771third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200705-02.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/24889third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24770third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25006third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24756third-party-advisory, x_refsource_SECUNIA
http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954x_refsource_CONFIRM
http://secunia.com/advisories/25495third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24996third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/23283vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2007-0126.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/23300vdb-entry, x_refsource_BID
http://support.apple.com/kb/HT3438x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200705-10.xmlvendor-advisory, x_refsource_GENTOO
http://www.ubuntu.com/usn/usn-448-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.mandriva.com/security/advisories?name=MDKSA-2007:080vendor-advisory, x_refsource_MANDRIVA
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733vendor-advisory, x_refsource_SLACKWARE
http://www.novell.com/linux/security/advisories/2007_6_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.mandriva.com/security/advisories?name=MDKSA-2007:081vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2008/dsa-1454vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/24758third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1264vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1017857vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/24885third-party-advisory, x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-178.htmx_refsource_CONFIRM
http://secunia.com/advisories/25096third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25195third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2007-0125.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24741third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.htmlvendor-advisory, x_refsource_APPLE
http://secunia.com/advisories/24776third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28333third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24768third-party-advisory, x_refsource_SECUNIA
http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.htmlmailing-list, x_refsource_MLIST
http://secunia.com/advisories/24791third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_27_x.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/30161third-party-advisory, x_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xmlvendor-advisory, x_refsource_GENTOO
http://sourceforge.net/project/shownotes.php?release_id=498954x_refsource_CONFIRM
http://www.debian.org/security/2007/dsa-1294vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/24765third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25216third-party-advisory, x_refsource_SECUNIA
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501third-party-advisory, x_refsource_IDEFENSE
http://www.securityfocus.com/archive/1/464686/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/464816/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2007/1548vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/33417vdb-entry, x_refsource_XF
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1vendor-advisory, x_refsource_SUNALERT
http://www.vupen.com/english/advisories/2007/1217vdb-entry, x_refsource_VUPEN
http://www.openbsd.org/errata40.html#011_xorgvendor-advisory, x_refsource_OPENBSD
https://issues.rpath.com/browse/RPL-1213x_refsource_CONFIRM
http://www.securityfocus.com/bid/23402vdb-entry, x_refsource_BID
http://secunia.com/advisories/25004third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25305third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266vdb-entry, signature, x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2007-0132.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24772third-party-advisory, x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-193.htmx_refsource_CONFIRM
http://www.openbsd.org/errata39.html#021_xorgvendor-advisory, x_refsource_OPENBSD
http://issues.foresightlinux.org/browse/FL-223x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2007:079vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T12:50:35.134Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2007:0150",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html",
               },
               {
                  name: "24745",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24745",
               },
               {
                  name: "24921",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24921",
               },
               {
                  name: "oval:org.mitre.oval:def:1810",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810",
               },
               {
                  name: "33937",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33937",
               },
               {
                  name: "2007-0013",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2007/0013/",
               },
               {
                  name: "24771",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24771",
               },
               {
                  name: "GLSA-200705-02",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200705-02.xml",
               },
               {
                  name: "24889",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24889",
               },
               {
                  name: "24770",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24770",
               },
               {
                  name: "25006",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25006",
               },
               {
                  name: "24756",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24756",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954",
               },
               {
                  name: "25495",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25495",
               },
               {
                  name: "24996",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24996",
               },
               {
                  name: "23283",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23283",
               },
               {
                  name: "RHSA-2007:0126",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
               },
               {
                  name: "23300",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23300",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.apple.com/kb/HT3438",
               },
               {
                  name: "GLSA-200705-10",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
               },
               {
                  name: "USN-448-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-448-1",
               },
               {
                  name: "APPLE-SA-2009-02-12",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
               },
               {
                  name: "MDKSA-2007:080",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
               },
               {
                  name: "SSA:2007-109-01",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733",
               },
               {
                  name: "SUSE-SR:2007:006",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html",
               },
               {
                  name: "MDKSA-2007:081",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081",
               },
               {
                  name: "DSA-1454",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2008/dsa-1454",
               },
               {
                  name: "24758",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24758",
               },
               {
                  name: "ADV-2007-1264",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/1264",
               },
               {
                  name: "1017857",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1017857",
               },
               {
                  name: "24885",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24885",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
               },
               {
                  name: "25096",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25096",
               },
               {
                  name: "25195",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25195",
               },
               {
                  name: "RHSA-2007:0125",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
               },
               {
                  name: "24741",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24741",
               },
               {
                  name: "APPLE-SA-2007-11-14",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
               },
               {
                  name: "24776",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24776",
               },
               {
                  name: "28333",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28333",
               },
               {
                  name: "24768",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24768",
               },
               {
                  name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
               },
               {
                  name: "24791",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24791",
               },
               {
                  name: "SUSE-SA:2007:027",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
               },
               {
                  name: "30161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30161",
               },
               {
                  name: "GLSA-200805-07",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/project/shownotes.php?release_id=498954",
               },
               {
                  name: "DSA-1294",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2007/dsa-1294",
               },
               {
                  name: "24765",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24765",
               },
               {
                  name: "25216",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25216",
               },
               {
                  name: "20070403 Multiple Vendor X Server BDF Font Parsing Integer Overflow Vulnerability",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_IDEFENSE",
                     "x_transferred",
                  ],
                  url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501",
               },
               {
                  name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
               },
               {
                  name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
               },
               {
                  name: "ADV-2007-1548",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/1548",
               },
               {
                  name: "xorg-bdf-font-bo(33417)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417",
               },
               {
                  name: "102886",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
               },
               {
                  name: "ADV-2007-1217",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/1217",
               },
               {
                  name: "[4.0] 011: SECURITY FIX: April 4, 2007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENBSD",
                     "x_transferred",
                  ],
                  url: "http://www.openbsd.org/errata40.html#011_xorg",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.rpath.com/browse/RPL-1213",
               },
               {
                  name: "23402",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23402",
               },
               {
                  name: "25004",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25004",
               },
               {
                  name: "25305",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25305",
               },
               {
                  name: "oval:org.mitre.oval:def:11266",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266",
               },
               {
                  name: "RHSA-2007:0132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
               },
               {
                  name: "24772",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24772",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm",
               },
               {
                  name: "[3.9] 021: SECURITY FIX: April 4, 2007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENBSD",
                     "x_transferred",
                  ],
                  url: "http://www.openbsd.org/errata39.html#021_xorg",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://issues.foresightlinux.org/browse/FL-223",
               },
               {
                  name: "MDKSA-2007:079",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-04-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-16T14:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "RHSA-2007:0150",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html",
            },
            {
               name: "24745",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24745",
            },
            {
               name: "24921",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24921",
            },
            {
               name: "oval:org.mitre.oval:def:1810",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810",
            },
            {
               name: "33937",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33937",
            },
            {
               name: "2007-0013",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2007/0013/",
            },
            {
               name: "24771",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24771",
            },
            {
               name: "GLSA-200705-02",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200705-02.xml",
            },
            {
               name: "24889",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24889",
            },
            {
               name: "24770",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24770",
            },
            {
               name: "25006",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25006",
            },
            {
               name: "24756",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24756",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954",
            },
            {
               name: "25495",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25495",
            },
            {
               name: "24996",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24996",
            },
            {
               name: "23283",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23283",
            },
            {
               name: "RHSA-2007:0126",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
            },
            {
               name: "23300",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23300",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.apple.com/kb/HT3438",
            },
            {
               name: "GLSA-200705-10",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
            },
            {
               name: "USN-448-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-448-1",
            },
            {
               name: "APPLE-SA-2009-02-12",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
            },
            {
               name: "MDKSA-2007:080",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
            },
            {
               name: "SSA:2007-109-01",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733",
            },
            {
               name: "SUSE-SR:2007:006",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html",
            },
            {
               name: "MDKSA-2007:081",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081",
            },
            {
               name: "DSA-1454",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2008/dsa-1454",
            },
            {
               name: "24758",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24758",
            },
            {
               name: "ADV-2007-1264",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/1264",
            },
            {
               name: "1017857",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1017857",
            },
            {
               name: "24885",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24885",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
            },
            {
               name: "25096",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25096",
            },
            {
               name: "25195",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25195",
            },
            {
               name: "RHSA-2007:0125",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
            },
            {
               name: "24741",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24741",
            },
            {
               name: "APPLE-SA-2007-11-14",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
            },
            {
               name: "24776",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24776",
            },
            {
               name: "28333",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28333",
            },
            {
               name: "24768",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24768",
            },
            {
               name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
            },
            {
               name: "24791",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24791",
            },
            {
               name: "SUSE-SA:2007:027",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
            },
            {
               name: "30161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30161",
            },
            {
               name: "GLSA-200805-07",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/project/shownotes.php?release_id=498954",
            },
            {
               name: "DSA-1294",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2007/dsa-1294",
            },
            {
               name: "24765",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24765",
            },
            {
               name: "25216",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25216",
            },
            {
               name: "20070403 Multiple Vendor X Server BDF Font Parsing Integer Overflow Vulnerability",
               tags: [
                  "third-party-advisory",
                  "x_refsource_IDEFENSE",
               ],
               url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501",
            },
            {
               name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
            },
            {
               name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
            },
            {
               name: "ADV-2007-1548",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/1548",
            },
            {
               name: "xorg-bdf-font-bo(33417)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417",
            },
            {
               name: "102886",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
            },
            {
               name: "ADV-2007-1217",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/1217",
            },
            {
               name: "[4.0] 011: SECURITY FIX: April 4, 2007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENBSD",
               ],
               url: "http://www.openbsd.org/errata40.html#011_xorg",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.rpath.com/browse/RPL-1213",
            },
            {
               name: "23402",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23402",
            },
            {
               name: "25004",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25004",
            },
            {
               name: "25305",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25305",
            },
            {
               name: "oval:org.mitre.oval:def:11266",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266",
            },
            {
               name: "RHSA-2007:0132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
            },
            {
               name: "24772",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24772",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm",
            },
            {
               name: "[3.9] 021: SECURITY FIX: April 4, 2007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENBSD",
               ],
               url: "http://www.openbsd.org/errata39.html#021_xorg",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://issues.foresightlinux.org/browse/FL-223",
            },
            {
               name: "MDKSA-2007:079",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2007-1351",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2007:0150",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html",
                  },
                  {
                     name: "24745",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24745",
                  },
                  {
                     name: "24921",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24921",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1810",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810",
                  },
                  {
                     name: "33937",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/33937",
                  },
                  {
                     name: "2007-0013",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2007/0013/",
                  },
                  {
                     name: "24771",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24771",
                  },
                  {
                     name: "GLSA-200705-02",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200705-02.xml",
                  },
                  {
                     name: "24889",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24889",
                  },
                  {
                     name: "24770",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24770",
                  },
                  {
                     name: "25006",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25006",
                  },
                  {
                     name: "24756",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24756",
                  },
                  {
                     name: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954",
                  },
                  {
                     name: "25495",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25495",
                  },
                  {
                     name: "24996",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24996",
                  },
                  {
                     name: "23283",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23283",
                  },
                  {
                     name: "RHSA-2007:0126",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
                  },
                  {
                     name: "23300",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23300",
                  },
                  {
                     name: "http://support.apple.com/kb/HT3438",
                     refsource: "CONFIRM",
                     url: "http://support.apple.com/kb/HT3438",
                  },
                  {
                     name: "GLSA-200705-10",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
                  },
                  {
                     name: "USN-448-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-448-1",
                  },
                  {
                     name: "APPLE-SA-2009-02-12",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                  },
                  {
                     name: "MDKSA-2007:080",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
                  },
                  {
                     name: "SSA:2007-109-01",
                     refsource: "SLACKWARE",
                     url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733",
                  },
                  {
                     name: "SUSE-SR:2007:006",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html",
                  },
                  {
                     name: "MDKSA-2007:081",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081",
                  },
                  {
                     name: "DSA-1454",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2008/dsa-1454",
                  },
                  {
                     name: "24758",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24758",
                  },
                  {
                     name: "ADV-2007-1264",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/1264",
                  },
                  {
                     name: "1017857",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1017857",
                  },
                  {
                     name: "24885",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24885",
                  },
                  {
                     name: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
                  },
                  {
                     name: "25096",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25096",
                  },
                  {
                     name: "25195",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25195",
                  },
                  {
                     name: "RHSA-2007:0125",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
                  },
                  {
                     name: "24741",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24741",
                  },
                  {
                     name: "APPLE-SA-2007-11-14",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
                  },
                  {
                     name: "24776",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24776",
                  },
                  {
                     name: "28333",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28333",
                  },
                  {
                     name: "24768",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24768",
                  },
                  {
                     name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
                     refsource: "MLIST",
                     url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
                  },
                  {
                     name: "24791",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24791",
                  },
                  {
                     name: "SUSE-SA:2007:027",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
                  },
                  {
                     name: "30161",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30161",
                  },
                  {
                     name: "GLSA-200805-07",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
                  },
                  {
                     name: "http://sourceforge.net/project/shownotes.php?release_id=498954",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/project/shownotes.php?release_id=498954",
                  },
                  {
                     name: "DSA-1294",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2007/dsa-1294",
                  },
                  {
                     name: "24765",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24765",
                  },
                  {
                     name: "25216",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25216",
                  },
                  {
                     name: "20070403 Multiple Vendor X Server BDF Font Parsing Integer Overflow Vulnerability",
                     refsource: "IDEFENSE",
                     url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501",
                  },
                  {
                     name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
                  },
                  {
                     name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
                  },
                  {
                     name: "ADV-2007-1548",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/1548",
                  },
                  {
                     name: "xorg-bdf-font-bo(33417)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417",
                  },
                  {
                     name: "102886",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
                  },
                  {
                     name: "ADV-2007-1217",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/1217",
                  },
                  {
                     name: "[4.0] 011: SECURITY FIX: April 4, 2007",
                     refsource: "OPENBSD",
                     url: "http://www.openbsd.org/errata40.html#011_xorg",
                  },
                  {
                     name: "https://issues.rpath.com/browse/RPL-1213",
                     refsource: "CONFIRM",
                     url: "https://issues.rpath.com/browse/RPL-1213",
                  },
                  {
                     name: "23402",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23402",
                  },
                  {
                     name: "25004",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25004",
                  },
                  {
                     name: "25305",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25305",
                  },
                  {
                     name: "oval:org.mitre.oval:def:11266",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266",
                  },
                  {
                     name: "RHSA-2007:0132",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
                  },
                  {
                     name: "24772",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24772",
                  },
                  {
                     name: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm",
                  },
                  {
                     name: "[3.9] 021: SECURITY FIX: April 4, 2007",
                     refsource: "OPENBSD",
                     url: "http://www.openbsd.org/errata39.html#021_xorg",
                  },
                  {
                     name: "http://issues.foresightlinux.org/browse/FL-223",
                     refsource: "CONFIRM",
                     url: "http://issues.foresightlinux.org/browse/FL-223",
                  },
                  {
                     name: "MDKSA-2007:079",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2007-1351",
      datePublished: "2007-04-06T01:00:00",
      dateReserved: "2007-03-08T00:00:00",
      dateUpdated: "2024-08-07T12:50:35.134Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-1463 (GCVE-0-2007-1463)
Vulnerability from cvelistv5
Published
2007-03-21 19:00
Modified
2024-08-07 12:59
Severity ?
Summary
Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/33163vdb-entry, x_refsource_XF
http://secunia.com/advisories/24859third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24615third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24597third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24584third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/23138vdb-entry, x_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-200704-10.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/24661third-party-advisory, x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1170x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/1059vdb-entry, x_refsource_VUPEN
http://www.novell.com/linux/security/advisories/2007_8_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.ubuntu.com/usn/usn-438-1vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDKSA-2007:069vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/463710/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/25072third-party-advisory, x_refsource_SECUNIA
http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106x_refsource_CONFIRM
http://www.securityfocus.com/bid/23070vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T12:59:08.098Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "inkscape-dialogs-format-string(33163)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163",
               },
               {
                  name: "24859",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24859",
               },
               {
                  name: "24615",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24615",
               },
               {
                  name: "24597",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24597",
               },
               {
                  name: "24584",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24584",
               },
               {
                  name: "23138",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23138",
               },
               {
                  name: "GLSA-200704-10",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml",
               },
               {
                  name: "24661",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24661",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.rpath.com/browse/RPL-1170",
               },
               {
                  name: "ADV-2007-1059",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/1059",
               },
               {
                  name: "SUSE-SR:2007:008",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html",
               },
               {
                  name: "USN-438-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-438-1",
               },
               {
                  name: "MDKSA-2007:069",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069",
               },
               {
                  name: "20070324 FLEA-2007-0002-1: inkscape",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded",
               },
               {
                  name: "25072",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25072",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106",
               },
               {
                  name: "23070",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23070",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-03-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-16T14:57:01",
            orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
            shortName: "canonical",
         },
         references: [
            {
               name: "inkscape-dialogs-format-string(33163)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163",
            },
            {
               name: "24859",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24859",
            },
            {
               name: "24615",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24615",
            },
            {
               name: "24597",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24597",
            },
            {
               name: "24584",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24584",
            },
            {
               name: "23138",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23138",
            },
            {
               name: "GLSA-200704-10",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml",
            },
            {
               name: "24661",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24661",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.rpath.com/browse/RPL-1170",
            },
            {
               name: "ADV-2007-1059",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/1059",
            },
            {
               name: "SUSE-SR:2007:008",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html",
            },
            {
               name: "USN-438-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-438-1",
            },
            {
               name: "MDKSA-2007:069",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069",
            },
            {
               name: "20070324 FLEA-2007-0002-1: inkscape",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded",
            },
            {
               name: "25072",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25072",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106",
            },
            {
               name: "23070",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23070",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@ubuntu.com",
               ID: "CVE-2007-1463",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "inkscape-dialogs-format-string(33163)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163",
                  },
                  {
                     name: "24859",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24859",
                  },
                  {
                     name: "24615",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24615",
                  },
                  {
                     name: "24597",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24597",
                  },
                  {
                     name: "24584",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24584",
                  },
                  {
                     name: "23138",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23138",
                  },
                  {
                     name: "GLSA-200704-10",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml",
                  },
                  {
                     name: "24661",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24661",
                  },
                  {
                     name: "https://issues.rpath.com/browse/RPL-1170",
                     refsource: "CONFIRM",
                     url: "https://issues.rpath.com/browse/RPL-1170",
                  },
                  {
                     name: "ADV-2007-1059",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/1059",
                  },
                  {
                     name: "SUSE-SR:2007:008",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html",
                  },
                  {
                     name: "USN-438-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-438-1",
                  },
                  {
                     name: "MDKSA-2007:069",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069",
                  },
                  {
                     name: "20070324 FLEA-2007-0002-1: inkscape",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded",
                  },
                  {
                     name: "25072",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25072",
                  },
                  {
                     name: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106",
                  },
                  {
                     name: "23070",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23070",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
      assignerShortName: "canonical",
      cveId: "CVE-2007-1463",
      datePublished: "2007-03-21T19:00:00",
      dateReserved: "2007-03-15T00:00:00",
      dateUpdated: "2024-08-07T12:59:08.098Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-3625 (GCVE-0-2005-3625)
Vulnerability from cvelistv5
Published
2006-01-06 22:00
Modified
2024-08-07 23:17
Severity ?
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
References
http://www.securityfocus.com/bid/16143vdb-entry, x_refsource_BID
http://www.debian.org/security/2005/dsa-932vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18349third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/18147third-party-advisory, x_refsource_SECUNIA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txtvendor-advisory, x_refsource_SCO
http://scary.beasts.org/security/CESA-2005-003.txtx_refsource_MISC
http://www.kde.org/info/security/advisory-20051207-2.txtx_refsource_CONFIRM
http://secunia.com/advisories/18679third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18312third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18644third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/236-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/18425third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18373third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18303third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-931vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18554third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/19230third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1vendor-advisory, x_refsource_SUNALERT
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2006/dsa-962vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.htmlx_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2006-0163.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2005/dsa-937vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18398third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/427053/100/0/threadedvendor-advisory, x_refsource_FEDORA
http://www.trustix.org/errata/2006/0002/vendor-advisory, x_refsource_TRUSTIX
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2006/dsa-936vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/18329third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18463third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18642third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18674third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18313third-party-advisory, x_refsource_SECUNIA
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-Uvendor-advisory, x_refsource_SGI
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-Uvendor-advisory, x_refsource_SGI
http://secunia.com/advisories/18448third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18436third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18428third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18380third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18423third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18416third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2006-0177.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2007/2280vdb-entry, x_refsource_VUPEN
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/18335third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18407third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18332third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18517third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18582third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18534third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683vendor-advisory, x_refsource_SLACKWARE
https://exchange.xforce.ibmcloud.com/vulnerabilities/24023vdb-entry, x_refsource_XF
http://secunia.com/advisories/18908third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.htmlx_refsource_CONFIRM
http://secunia.com/advisories/25729third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18414third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18338third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008vendor-advisory, x_refsource_MANDRIVA
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-Uvendor-advisory, x_refsource_SGI
http://www.redhat.com/support/errata/RHSA-2006-0160.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010vendor-advisory, x_refsource_MANDRAKE
http://www.debian.org/security/2005/dsa-940vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2006/0047vdb-entry, x_refsource_VUPEN
http://www.gentoo.org/security/en/glsa/glsa-200601-17.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/18389third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/19377third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/archive/1/427990/100/0/threadedvendor-advisory, x_refsource_FEDORA
http://www.debian.org/security/2006/dsa-961vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18675third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18913third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-938vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18334third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18375third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-950vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18387third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18385third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T23:17:23.366Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "16143",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/16143",
               },
               {
                  name: "DSA-932",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-932",
               },
               {
                  name: "18349",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18349",
               },
               {
                  name: "oval:org.mitre.oval:def:9575",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575",
               },
               {
                  name: "18147",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18147",
               },
               {
                  name: "SCOSA-2006.15",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://scary.beasts.org/security/CESA-2005-003.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
               },
               {
                  name: "18679",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18679",
               },
               {
                  name: "18312",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18312",
               },
               {
                  name: "18644",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18644",
               },
               {
                  name: "USN-236-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/236-1/",
               },
               {
                  name: "18425",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18425",
               },
               {
                  name: "18373",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18373",
               },
               {
                  name: "18303",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18303",
               },
               {
                  name: "DSA-931",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-931",
               },
               {
                  name: "18554",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18554",
               },
               {
                  name: "MDKSA-2006:003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
               },
               {
                  name: "19230",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19230",
               },
               {
                  name: "102972",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
               },
               {
                  name: "MDKSA-2006:012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
               },
               {
                  name: "DSA-962",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-962",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html",
               },
               {
                  name: "RHSA-2006:0163",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
               },
               {
                  name: "DSA-937",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-937",
               },
               {
                  name: "18398",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18398",
               },
               {
                  name: "FLSA-2006:176751",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
               },
               {
                  name: "2006-0002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2006/0002/",
               },
               {
                  name: "SUSE-SA:2006:001",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
               },
               {
                  name: "DSA-936",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-936",
               },
               {
                  name: "FEDORA-2005-026",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
               },
               {
                  name: "18329",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18329",
               },
               {
                  name: "18463",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18463",
               },
               {
                  name: "18642",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18642",
               },
               {
                  name: "18674",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18674",
               },
               {
                  name: "MDKSA-2006:005",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
               },
               {
                  name: "18313",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18313",
               },
               {
                  name: "20051201-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
               },
               {
                  name: "20060101-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
               },
               {
                  name: "18448",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18448",
               },
               {
                  name: "18436",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18436",
               },
               {
                  name: "18428",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18428",
               },
               {
                  name: "18380",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18380",
               },
               {
                  name: "18423",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18423",
               },
               {
                  name: "18416",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18416",
               },
               {
                  name: "RHSA-2006:0177",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
               },
               {
                  name: "ADV-2007-2280",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/2280",
               },
               {
                  name: "GLSA-200601-02",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
               },
               {
                  name: "18335",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18335",
               },
               {
                  name: "18407",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18407",
               },
               {
                  name: "18332",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18332",
               },
               {
                  name: "18517",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18517",
               },
               {
                  name: "18582",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18582",
               },
               {
                  name: "18534",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18534",
               },
               {
                  name: "SSA:2006-045-09",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
               },
               {
                  name: "xpdf-ccittfaxdecode-dctdecode-dos(24023)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023",
               },
               {
                  name: "18908",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18908",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html",
               },
               {
                  name: "25729",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25729",
               },
               {
                  name: "18414",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18414",
               },
               {
                  name: "MDKSA-2006:006",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
               },
               {
                  name: "18338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18338",
               },
               {
                  name: "MDKSA-2006:008",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
               },
               {
                  name: "20060201-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
               },
               {
                  name: "RHSA-2006:0160",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
               },
               {
                  name: "MDKSA-2006:010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
               },
               {
                  name: "DSA-940",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-940",
               },
               {
                  name: "MDKSA-2006:004",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
               },
               {
                  name: "ADV-2006-0047",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/0047",
               },
               {
                  name: "GLSA-200601-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
               },
               {
                  name: "18389",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18389",
               },
               {
                  name: "SSA:2006-045-04",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
               },
               {
                  name: "19377",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19377",
               },
               {
                  name: "FEDORA-2005-025",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
               },
               {
                  name: "FLSA:175404",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
               },
               {
                  name: "DSA-961",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-961",
               },
               {
                  name: "18675",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18675",
               },
               {
                  name: "18913",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18913",
               },
               {
                  name: "DSA-938",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-938",
               },
               {
                  name: "18334",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18334",
               },
               {
                  name: "18375",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18375",
               },
               {
                  name: "DSA-950",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-950",
               },
               {
                  name: "18387",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18387",
               },
               {
                  name: "MDKSA-2006:011",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
               },
               {
                  name: "18385",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18385",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-01-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka \"Infinite CPU spins.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-19T14:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "16143",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/16143",
            },
            {
               name: "DSA-932",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-932",
            },
            {
               name: "18349",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18349",
            },
            {
               name: "oval:org.mitre.oval:def:9575",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575",
            },
            {
               name: "18147",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18147",
            },
            {
               name: "SCOSA-2006.15",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://scary.beasts.org/security/CESA-2005-003.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
            },
            {
               name: "18679",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18679",
            },
            {
               name: "18312",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18312",
            },
            {
               name: "18644",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18644",
            },
            {
               name: "USN-236-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/236-1/",
            },
            {
               name: "18425",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18425",
            },
            {
               name: "18373",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18373",
            },
            {
               name: "18303",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18303",
            },
            {
               name: "DSA-931",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-931",
            },
            {
               name: "18554",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18554",
            },
            {
               name: "MDKSA-2006:003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
            },
            {
               name: "19230",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19230",
            },
            {
               name: "102972",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
            },
            {
               name: "MDKSA-2006:012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
            },
            {
               name: "DSA-962",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-962",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html",
            },
            {
               name: "RHSA-2006:0163",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
            },
            {
               name: "DSA-937",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-937",
            },
            {
               name: "18398",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18398",
            },
            {
               name: "FLSA-2006:176751",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
            },
            {
               name: "2006-0002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2006/0002/",
            },
            {
               name: "SUSE-SA:2006:001",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
            },
            {
               name: "DSA-936",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-936",
            },
            {
               name: "FEDORA-2005-026",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
            },
            {
               name: "18329",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18329",
            },
            {
               name: "18463",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18463",
            },
            {
               name: "18642",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18642",
            },
            {
               name: "18674",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18674",
            },
            {
               name: "MDKSA-2006:005",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
            },
            {
               name: "18313",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18313",
            },
            {
               name: "20051201-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
            },
            {
               name: "20060101-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
            },
            {
               name: "18448",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18448",
            },
            {
               name: "18436",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18436",
            },
            {
               name: "18428",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18428",
            },
            {
               name: "18380",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18380",
            },
            {
               name: "18423",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18423",
            },
            {
               name: "18416",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18416",
            },
            {
               name: "RHSA-2006:0177",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
            },
            {
               name: "ADV-2007-2280",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/2280",
            },
            {
               name: "GLSA-200601-02",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
            },
            {
               name: "18335",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18335",
            },
            {
               name: "18407",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18407",
            },
            {
               name: "18332",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18332",
            },
            {
               name: "18517",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18517",
            },
            {
               name: "18582",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18582",
            },
            {
               name: "18534",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18534",
            },
            {
               name: "SSA:2006-045-09",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
            },
            {
               name: "xpdf-ccittfaxdecode-dctdecode-dos(24023)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023",
            },
            {
               name: "18908",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18908",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html",
            },
            {
               name: "25729",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25729",
            },
            {
               name: "18414",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18414",
            },
            {
               name: "MDKSA-2006:006",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
            },
            {
               name: "18338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18338",
            },
            {
               name: "MDKSA-2006:008",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
            },
            {
               name: "20060201-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
            },
            {
               name: "RHSA-2006:0160",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
            },
            {
               name: "MDKSA-2006:010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
            },
            {
               name: "DSA-940",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-940",
            },
            {
               name: "MDKSA-2006:004",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
            },
            {
               name: "ADV-2006-0047",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/0047",
            },
            {
               name: "GLSA-200601-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
            },
            {
               name: "18389",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18389",
            },
            {
               name: "SSA:2006-045-04",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
            },
            {
               name: "19377",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19377",
            },
            {
               name: "FEDORA-2005-025",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
            },
            {
               name: "FLSA:175404",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
            },
            {
               name: "DSA-961",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-961",
            },
            {
               name: "18675",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18675",
            },
            {
               name: "18913",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18913",
            },
            {
               name: "DSA-938",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-938",
            },
            {
               name: "18334",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18334",
            },
            {
               name: "18375",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18375",
            },
            {
               name: "DSA-950",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-950",
            },
            {
               name: "18387",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18387",
            },
            {
               name: "MDKSA-2006:011",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
            },
            {
               name: "18385",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18385",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2005-3625",
      datePublished: "2006-01-06T22:00:00",
      dateReserved: "2005-11-16T00:00:00",
      dateUpdated: "2024-08-07T23:17:23.366Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1058 (GCVE-0-2004-1058)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.
References
http://secunia.com/advisories/18684third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19038third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022vendor-advisory, x_refsource_MANDRAKE
https://exchange.xforce.ibmcloud.com/vulnerabilities/17151vdb-entry, x_refsource_XF
http://secunia.com/advisories/19369third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21476third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/11937vdb-entry, x_refsource_BID
http://www.debian.org/security/2006/dsa-1018vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/11052vdb-entry, x_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-200408-24.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/19607third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0190.htmlvendor-advisory, x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427vdb-entry, signature, x_refsource_OVAL
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.htmlvendor-advisory, x_refsource_SUSE
https://usn.ubuntu.com/38-1/vendor-advisory, x_refsource_UBUNTU
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532vendor-advisory, x_refsource_FEDORA
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-Uvendor-advisory, x_refsource_SGI
http://www.redhat.com/support/errata/RHSA-2005-293.htmlvendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2006-0191.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.873Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "18684",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18684",
               },
               {
                  name: "19038",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19038",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "linux-spawning-race-condition(17151)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151",
               },
               {
                  name: "19369",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19369",
               },
               {
                  name: "21476",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/21476",
               },
               {
                  name: "11937",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11937",
               },
               {
                  name: "DSA-1018",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1018",
               },
               {
                  name: "11052",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11052",
               },
               {
                  name: "GLSA-200408-24",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml",
               },
               {
                  name: "19607",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19607",
               },
               {
                  name: "RHSA-2006:0190",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html",
               },
               {
                  name: "oval:org.mitre.oval:def:10427",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427",
               },
               {
                  name: "SUSE-SA:2006:012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html",
               },
               {
                  name: "USN-38-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/38-1/",
               },
               {
                  name: "FLSA:152532",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
               },
               {
                  name: "20060402-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
               },
               {
                  name: "RHSA-2005:293",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
               },
               {
                  name: "RHSA-2006:0191",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "18684",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18684",
            },
            {
               name: "19038",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19038",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "linux-spawning-race-condition(17151)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151",
            },
            {
               name: "19369",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19369",
            },
            {
               name: "21476",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/21476",
            },
            {
               name: "11937",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11937",
            },
            {
               name: "DSA-1018",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1018",
            },
            {
               name: "11052",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11052",
            },
            {
               name: "GLSA-200408-24",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml",
            },
            {
               name: "19607",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19607",
            },
            {
               name: "RHSA-2006:0190",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html",
            },
            {
               name: "oval:org.mitre.oval:def:10427",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427",
            },
            {
               name: "SUSE-SA:2006:012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html",
            },
            {
               name: "USN-38-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/38-1/",
            },
            {
               name: "FLSA:152532",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
            },
            {
               name: "20060402-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
            },
            {
               name: "RHSA-2005:293",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
            },
            {
               name: "RHSA-2006:0191",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1058",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "18684",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18684",
                  },
                  {
                     name: "19038",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19038",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "linux-spawning-race-condition(17151)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151",
                  },
                  {
                     name: "19369",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19369",
                  },
                  {
                     name: "21476",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/21476",
                  },
                  {
                     name: "11937",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11937",
                  },
                  {
                     name: "DSA-1018",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1018",
                  },
                  {
                     name: "11052",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11052",
                  },
                  {
                     name: "GLSA-200408-24",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml",
                  },
                  {
                     name: "19607",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19607",
                  },
                  {
                     name: "RHSA-2006:0190",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10427",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427",
                  },
                  {
                     name: "SUSE-SA:2006:012",
                     refsource: "SUSE",
                     url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html",
                  },
                  {
                     name: "USN-38-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/38-1/",
                  },
                  {
                     name: "FLSA:152532",
                     refsource: "FEDORA",
                     url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
                  },
                  {
                     name: "20060402-01-U",
                     refsource: "SGI",
                     url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
                  },
                  {
                     name: "RHSA-2005:293",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
                  },
                  {
                     name: "RHSA-2006:0191",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1058",
      datePublished: "2004-12-22T05:00:00",
      dateReserved: "2004-11-23T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.873Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0969 (GCVE-0-2004-0969)
Vulnerability from cvelistv5
Published
2004-10-20 04:00
Modified
2024-08-08 00:38
Severity ?
Summary
The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
References
http://www.gentoo.org/security/en/glsa/glsa-200411-15.xmlvendor-advisory, x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583vdb-entry, x_refsource_XF
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/11287vdb-entry, x_refsource_BID
http://www.trustix.org/errata/2004/0050vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/18764third-party-advisory, x_refsource_SECUNIA
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:38:59.628Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-200411-15",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml",
               },
               {
                  name: "script-temporary-file-overwrite(17583)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
               },
               {
                  name: "MDKSA-2006:038",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038",
               },
               {
                  name: "11287",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11287",
               },
               {
                  name: "2004-0050",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2004/0050",
               },
               {
                  name: "18764",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18764",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-09-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "GLSA-200411-15",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml",
            },
            {
               name: "script-temporary-file-overwrite(17583)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
            },
            {
               name: "MDKSA-2006:038",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038",
            },
            {
               name: "11287",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11287",
            },
            {
               name: "2004-0050",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2004/0050",
            },
            {
               name: "18764",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18764",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0969",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "GLSA-200411-15",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml",
                  },
                  {
                     name: "script-temporary-file-overwrite(17583)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
                  },
                  {
                     name: "MDKSA-2006:038",
                     refsource: "MANDRIVA",
                     url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038",
                  },
                  {
                     name: "11287",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11287",
                  },
                  {
                     name: "2004-0050",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2004/0050",
                  },
                  {
                     name: "18764",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18764",
                  },
                  {
                     name: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313",
                     refsource: "CONFIRM",
                     url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0969",
      datePublished: "2004-10-20T04:00:00",
      dateReserved: "2004-10-19T00:00:00",
      dateUpdated: "2024-08-08T00:38:59.628Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2009-2939 (GCVE-0-2009-2939)
Vulnerability from cvelistv5
Published
2009-09-21 19:00
Modified
2024-08-07 06:07
Severity ?
Summary
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
References
http://www.openwall.com/lists/oss-security/2009/09/18/6mailing-list, x_refsource_MLIST
http://www.debian.org/security/2011/dsa-2233vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T06:07:37.330Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2009/09/18/6",
               },
               {
                  name: "DSA-2233",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2233",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2009-09-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2011-08-23T09:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2009/09/18/6",
            },
            {
               name: "DSA-2233",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2233",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2009-2939",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2009/09/18/6",
                  },
                  {
                     name: "DSA-2233",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2011/dsa-2233",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2009-2939",
      datePublished: "2009-09-21T19:00:00",
      dateReserved: "2009-08-23T00:00:00",
      dateUpdated: "2024-08-07T06:07:37.330Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-3626 (GCVE-0-2005-3626)
Vulnerability from cvelistv5
Published
2006-01-06 22:00
Modified
2024-08-07 23:17
Severity ?
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
References
http://www.securityfocus.com/bid/16143vdb-entry, x_refsource_BID
http://www.debian.org/security/2005/dsa-932vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18349third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18147third-party-advisory, x_refsource_SECUNIA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txtvendor-advisory, x_refsource_SCO
http://scary.beasts.org/security/CESA-2005-003.txtx_refsource_MISC
http://www.kde.org/info/security/advisory-20051207-2.txtx_refsource_CONFIRM
http://secunia.com/advisories/18679third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18312third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18644third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/236-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/18425third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18373third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/18303third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-931vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18554third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/19230third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1vendor-advisory, x_refsource_SUNALERT
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2006/dsa-962vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.htmlx_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2006-0163.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2005/dsa-937vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18398third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/427053/100/0/threadedvendor-advisory, x_refsource_FEDORA
http://www.trustix.org/errata/2006/0002/vendor-advisory, x_refsource_TRUSTIX
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2006/dsa-936vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/18329third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18463third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18642third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18674third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18313third-party-advisory, x_refsource_SECUNIA
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-Uvendor-advisory, x_refsource_SGI
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-Uvendor-advisory, x_refsource_SGI
http://secunia.com/advisories/18448third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18436third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18428third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/24026vdb-entry, x_refsource_XF
http://secunia.com/advisories/18380third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18423third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18416third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2006-0177.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2007/2280vdb-entry, x_refsource_VUPEN
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/18335third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18407third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18332third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18517third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18582third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18534third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/18908third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.htmlx_refsource_CONFIRM
http://secunia.com/advisories/25729third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18414third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18338third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008vendor-advisory, x_refsource_MANDRIVA
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-Uvendor-advisory, x_refsource_SGI
http://www.redhat.com/support/errata/RHSA-2006-0160.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010vendor-advisory, x_refsource_MANDRAKE
http://www.debian.org/security/2005/dsa-940vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2006/0047vdb-entry, x_refsource_VUPEN
http://www.gentoo.org/security/en/glsa/glsa-200601-17.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/18389third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/19377third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/archive/1/427990/100/0/threadedvendor-advisory, x_refsource_FEDORA
http://www.debian.org/security/2006/dsa-961vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18675third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18913third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-938vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18334third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18375third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-950vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18387third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18385third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T23:17:23.446Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "16143",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/16143",
               },
               {
                  name: "DSA-932",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-932",
               },
               {
                  name: "18349",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18349",
               },
               {
                  name: "18147",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18147",
               },
               {
                  name: "SCOSA-2006.15",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://scary.beasts.org/security/CESA-2005-003.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
               },
               {
                  name: "18679",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18679",
               },
               {
                  name: "18312",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18312",
               },
               {
                  name: "18644",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18644",
               },
               {
                  name: "USN-236-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/236-1/",
               },
               {
                  name: "18425",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18425",
               },
               {
                  name: "18373",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18373",
               },
               {
                  name: "oval:org.mitre.oval:def:9992",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992",
               },
               {
                  name: "18303",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18303",
               },
               {
                  name: "DSA-931",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-931",
               },
               {
                  name: "18554",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18554",
               },
               {
                  name: "MDKSA-2006:003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
               },
               {
                  name: "19230",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19230",
               },
               {
                  name: "102972",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
               },
               {
                  name: "MDKSA-2006:012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
               },
               {
                  name: "DSA-962",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-962",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html",
               },
               {
                  name: "RHSA-2006:0163",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
               },
               {
                  name: "DSA-937",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-937",
               },
               {
                  name: "18398",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18398",
               },
               {
                  name: "FLSA-2006:176751",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
               },
               {
                  name: "2006-0002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2006/0002/",
               },
               {
                  name: "SUSE-SA:2006:001",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
               },
               {
                  name: "DSA-936",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-936",
               },
               {
                  name: "FEDORA-2005-026",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
               },
               {
                  name: "18329",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18329",
               },
               {
                  name: "18463",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18463",
               },
               {
                  name: "18642",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18642",
               },
               {
                  name: "18674",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18674",
               },
               {
                  name: "MDKSA-2006:005",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
               },
               {
                  name: "18313",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18313",
               },
               {
                  name: "20051201-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
               },
               {
                  name: "20060101-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
               },
               {
                  name: "18448",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18448",
               },
               {
                  name: "18436",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18436",
               },
               {
                  name: "18428",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18428",
               },
               {
                  name: "xpdf-flatedecode-dos(24026)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026",
               },
               {
                  name: "18380",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18380",
               },
               {
                  name: "18423",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18423",
               },
               {
                  name: "18416",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18416",
               },
               {
                  name: "RHSA-2006:0177",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
               },
               {
                  name: "ADV-2007-2280",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/2280",
               },
               {
                  name: "GLSA-200601-02",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
               },
               {
                  name: "18335",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18335",
               },
               {
                  name: "18407",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18407",
               },
               {
                  name: "18332",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18332",
               },
               {
                  name: "18517",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18517",
               },
               {
                  name: "18582",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18582",
               },
               {
                  name: "18534",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18534",
               },
               {
                  name: "SSA:2006-045-09",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
               },
               {
                  name: "18908",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18908",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html",
               },
               {
                  name: "25729",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25729",
               },
               {
                  name: "18414",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18414",
               },
               {
                  name: "MDKSA-2006:006",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
               },
               {
                  name: "18338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18338",
               },
               {
                  name: "MDKSA-2006:008",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
               },
               {
                  name: "20060201-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
               },
               {
                  name: "RHSA-2006:0160",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
               },
               {
                  name: "MDKSA-2006:010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
               },
               {
                  name: "DSA-940",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-940",
               },
               {
                  name: "MDKSA-2006:004",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
               },
               {
                  name: "ADV-2006-0047",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/0047",
               },
               {
                  name: "GLSA-200601-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
               },
               {
                  name: "18389",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18389",
               },
               {
                  name: "SSA:2006-045-04",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
               },
               {
                  name: "19377",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19377",
               },
               {
                  name: "FEDORA-2005-025",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
               },
               {
                  name: "FLSA:175404",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
               },
               {
                  name: "DSA-961",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-961",
               },
               {
                  name: "18675",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18675",
               },
               {
                  name: "18913",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18913",
               },
               {
                  name: "DSA-938",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-938",
               },
               {
                  name: "18334",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18334",
               },
               {
                  name: "18375",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18375",
               },
               {
                  name: "DSA-950",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-950",
               },
               {
                  name: "18387",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18387",
               },
               {
                  name: "MDKSA-2006:011",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
               },
               {
                  name: "18385",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18385",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-01-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-19T14:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "16143",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/16143",
            },
            {
               name: "DSA-932",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-932",
            },
            {
               name: "18349",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18349",
            },
            {
               name: "18147",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18147",
            },
            {
               name: "SCOSA-2006.15",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://scary.beasts.org/security/CESA-2005-003.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
            },
            {
               name: "18679",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18679",
            },
            {
               name: "18312",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18312",
            },
            {
               name: "18644",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18644",
            },
            {
               name: "USN-236-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/236-1/",
            },
            {
               name: "18425",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18425",
            },
            {
               name: "18373",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18373",
            },
            {
               name: "oval:org.mitre.oval:def:9992",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992",
            },
            {
               name: "18303",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18303",
            },
            {
               name: "DSA-931",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-931",
            },
            {
               name: "18554",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18554",
            },
            {
               name: "MDKSA-2006:003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
            },
            {
               name: "19230",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19230",
            },
            {
               name: "102972",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
            },
            {
               name: "MDKSA-2006:012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
            },
            {
               name: "DSA-962",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-962",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html",
            },
            {
               name: "RHSA-2006:0163",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
            },
            {
               name: "DSA-937",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-937",
            },
            {
               name: "18398",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18398",
            },
            {
               name: "FLSA-2006:176751",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
            },
            {
               name: "2006-0002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2006/0002/",
            },
            {
               name: "SUSE-SA:2006:001",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
            },
            {
               name: "DSA-936",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-936",
            },
            {
               name: "FEDORA-2005-026",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
            },
            {
               name: "18329",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18329",
            },
            {
               name: "18463",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18463",
            },
            {
               name: "18642",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18642",
            },
            {
               name: "18674",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18674",
            },
            {
               name: "MDKSA-2006:005",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
            },
            {
               name: "18313",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18313",
            },
            {
               name: "20051201-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
            },
            {
               name: "20060101-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
            },
            {
               name: "18448",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18448",
            },
            {
               name: "18436",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18436",
            },
            {
               name: "18428",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18428",
            },
            {
               name: "xpdf-flatedecode-dos(24026)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026",
            },
            {
               name: "18380",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18380",
            },
            {
               name: "18423",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18423",
            },
            {
               name: "18416",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18416",
            },
            {
               name: "RHSA-2006:0177",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
            },
            {
               name: "ADV-2007-2280",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/2280",
            },
            {
               name: "GLSA-200601-02",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
            },
            {
               name: "18335",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18335",
            },
            {
               name: "18407",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18407",
            },
            {
               name: "18332",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18332",
            },
            {
               name: "18517",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18517",
            },
            {
               name: "18582",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18582",
            },
            {
               name: "18534",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18534",
            },
            {
               name: "SSA:2006-045-09",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
            },
            {
               name: "18908",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18908",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html",
            },
            {
               name: "25729",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25729",
            },
            {
               name: "18414",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18414",
            },
            {
               name: "MDKSA-2006:006",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
            },
            {
               name: "18338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18338",
            },
            {
               name: "MDKSA-2006:008",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
            },
            {
               name: "20060201-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
            },
            {
               name: "RHSA-2006:0160",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
            },
            {
               name: "MDKSA-2006:010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
            },
            {
               name: "DSA-940",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-940",
            },
            {
               name: "MDKSA-2006:004",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
            },
            {
               name: "ADV-2006-0047",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/0047",
            },
            {
               name: "GLSA-200601-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
            },
            {
               name: "18389",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18389",
            },
            {
               name: "SSA:2006-045-04",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
            },
            {
               name: "19377",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19377",
            },
            {
               name: "FEDORA-2005-025",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
            },
            {
               name: "FLSA:175404",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
            },
            {
               name: "DSA-961",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-961",
            },
            {
               name: "18675",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18675",
            },
            {
               name: "18913",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18913",
            },
            {
               name: "DSA-938",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-938",
            },
            {
               name: "18334",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18334",
            },
            {
               name: "18375",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18375",
            },
            {
               name: "DSA-950",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-950",
            },
            {
               name: "18387",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18387",
            },
            {
               name: "MDKSA-2006:011",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
            },
            {
               name: "18385",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18385",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2005-3626",
      datePublished: "2006-01-06T22:00:00",
      dateReserved: "2005-11-16T00:00:00",
      dateUpdated: "2024-08-07T23:17:23.446Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0080 (GCVE-0-2005-0080)
Vulnerability from cvelistv5
Published
2005-01-19 05:00
Modified
2024-08-07 20:57
Severity ?
Summary
The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T20:57:41.090Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20050110 [USN-59-1] mailman vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://qa.debian.org/bts-security.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-01-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-10-17T13:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20050110 [USN-59-1] mailman vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://qa.debian.org/bts-security.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-0080",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20050110 [USN-59-1] mailman vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2",
                  },
                  {
                     name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839",
                     refsource: "CONFIRM",
                     url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839",
                  },
                  {
                     name: "http://qa.debian.org/bts-security.html",
                     refsource: "MISC",
                     url: "http://qa.debian.org/bts-security.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-0080",
      datePublished: "2005-01-19T05:00:00",
      dateReserved: "2005-01-14T00:00:00",
      dateUpdated: "2024-08-07T20:57:41.090Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0817 (GCVE-0-2004-0817)
Vulnerability from cvelistv5
Published
2004-09-17 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.476Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2004:465",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-465.html",
               },
               {
                  name: "DSA-548",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-548",
               },
               {
                  name: "MDKSA-2004:089",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089",
               },
               {
                  name: "imlib-bmp-bo(17182)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182",
               },
               {
                  name: "201611",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
               },
               {
                  name: "CLA-2004:870",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
               },
               {
                  name: "11084",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11084",
               },
               {
                  name: "oval:org.mitre.oval:def:8843",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843",
               },
               {
                  name: "GLSA-200409-12",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-09-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2004:465",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-465.html",
            },
            {
               name: "DSA-548",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-548",
            },
            {
               name: "MDKSA-2004:089",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089",
            },
            {
               name: "imlib-bmp-bo(17182)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182",
            },
            {
               name: "201611",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
            },
            {
               name: "CLA-2004:870",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
            },
            {
               name: "11084",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11084",
            },
            {
               name: "oval:org.mitre.oval:def:8843",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843",
            },
            {
               name: "GLSA-200409-12",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0817",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2004:465",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-465.html",
                  },
                  {
                     name: "DSA-548",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-548",
                  },
                  {
                     name: "MDKSA-2004:089",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089",
                  },
                  {
                     name: "imlib-bmp-bo(17182)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182",
                  },
                  {
                     name: "201611",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
                  },
                  {
                     name: "CLA-2004:870",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
                  },
                  {
                     name: "11084",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11084",
                  },
                  {
                     name: "oval:org.mitre.oval:def:8843",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843",
                  },
                  {
                     name: "GLSA-200409-12",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0817",
      datePublished: "2004-09-17T04:00:00",
      dateReserved: "2004-08-25T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.476Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0206 (GCVE-0-2005-0206)
Vulnerability from cvelistv5
Published
2005-02-15 05:00
Modified
2024-08-07 21:05
Severity ?
Summary
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T21:05:25.397Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "oval:org.mitre.oval:def:11107",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107",
               },
               {
                  name: "MDKSA-2005:041",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041",
               },
               {
                  name: "11501",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11501",
               },
               {
                  name: "RHSA-2005:034",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-034.html",
               },
               {
                  name: "MDKSA-2005:056",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056",
               },
               {
                  name: "MDKSA-2005:043",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043",
               },
               {
                  name: "RHSA-2005:213",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-213.html",
               },
               {
                  name: "MDKSA-2005:044",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044",
               },
               {
                  name: "RHSA-2005:053",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-053.html",
               },
               {
                  name: "xpdf-pdf-bo(17818)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
               },
               {
                  name: "MDKSA-2005:052",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052",
               },
               {
                  name: "RHSA-2005:132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-132.html",
               },
               {
                  name: "MDKSA-2005:042",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042",
               },
               {
                  name: "RHSA-2005:057",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-057.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-02-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "oval:org.mitre.oval:def:11107",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107",
            },
            {
               name: "MDKSA-2005:041",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041",
            },
            {
               name: "11501",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11501",
            },
            {
               name: "RHSA-2005:034",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-034.html",
            },
            {
               name: "MDKSA-2005:056",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056",
            },
            {
               name: "MDKSA-2005:043",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043",
            },
            {
               name: "RHSA-2005:213",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-213.html",
            },
            {
               name: "MDKSA-2005:044",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044",
            },
            {
               name: "RHSA-2005:053",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-053.html",
            },
            {
               name: "xpdf-pdf-bo(17818)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
            },
            {
               name: "MDKSA-2005:052",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052",
            },
            {
               name: "RHSA-2005:132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-132.html",
            },
            {
               name: "MDKSA-2005:042",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042",
            },
            {
               name: "RHSA-2005:057",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-057.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-0206",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "oval:org.mitre.oval:def:11107",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107",
                  },
                  {
                     name: "MDKSA-2005:041",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041",
                  },
                  {
                     name: "11501",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11501",
                  },
                  {
                     name: "RHSA-2005:034",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-034.html",
                  },
                  {
                     name: "MDKSA-2005:056",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056",
                  },
                  {
                     name: "MDKSA-2005:043",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043",
                  },
                  {
                     name: "RHSA-2005:213",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-213.html",
                  },
                  {
                     name: "MDKSA-2005:044",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044",
                  },
                  {
                     name: "RHSA-2005:053",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-053.html",
                  },
                  {
                     name: "xpdf-pdf-bo(17818)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
                  },
                  {
                     name: "MDKSA-2005:052",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052",
                  },
                  {
                     name: "RHSA-2005:132",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-132.html",
                  },
                  {
                     name: "MDKSA-2005:042",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042",
                  },
                  {
                     name: "RHSA-2005:057",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-057.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-0206",
      datePublished: "2005-02-15T05:00:00",
      dateReserved: "2005-02-01T00:00:00",
      dateUpdated: "2024-08-07T21:05:25.397Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0889 (GCVE-0-2004-0889)
Vulnerability from cvelistv5
Published
2004-10-26 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:48.137Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "11501",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11501",
               },
               {
                  name: "MDKSA-2004:113",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
               },
               {
                  name: "GLSA-200410-20",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
               },
               {
                  name: "GLSA-200410-30",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
               },
               {
                  name: "xpdf-pdf-file-bo(17819)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819",
               },
               {
                  name: "SUSE-SA:2004:039",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "11501",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11501",
            },
            {
               name: "MDKSA-2004:113",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
            },
            {
               name: "GLSA-200410-20",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
            },
            {
               name: "GLSA-200410-30",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
            },
            {
               name: "xpdf-pdf-file-bo(17819)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819",
            },
            {
               name: "SUSE-SA:2004:039",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0889",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "11501",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11501",
                  },
                  {
                     name: "MDKSA-2004:113",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
                  },
                  {
                     name: "GLSA-200410-20",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
                  },
                  {
                     name: "GLSA-200410-30",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
                  },
                  {
                     name: "xpdf-pdf-file-bo(17819)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819",
                  },
                  {
                     name: "SUSE-SA:2004:039",
                     refsource: "SUSE",
                     url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0889",
      datePublished: "2004-10-26T04:00:00",
      dateReserved: "2004-09-22T00:00:00",
      dateUpdated: "2024-08-08T00:31:48.137Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1065 (GCVE-0-2004-1065)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.815Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2005:032",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
               },
               {
                  name: "SUSE-SA:2005:002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.php.net/release_4_3_10.php",
               },
               {
                  name: "oval:org.mitre.oval:def:10877",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877",
               },
               {
                  name: "MDKSA-2004:151",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
               },
               {
                  name: "FLSA:2344",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
               },
               {
                  name: "php-exifreaddata-bo(18517)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517",
               },
               {
                  name: "OpenPKG-SA-2004.053",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENPKG",
                     "x_transferred",
                  ],
                  url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
               },
               {
                  name: "HPSBMA01212",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/advisories/9028",
               },
               {
                  name: "RHSA-2004:687",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2005:032",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
            },
            {
               name: "SUSE-SA:2005:002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.php.net/release_4_3_10.php",
            },
            {
               name: "oval:org.mitre.oval:def:10877",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877",
            },
            {
               name: "MDKSA-2004:151",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
            },
            {
               name: "FLSA:2344",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
            },
            {
               name: "php-exifreaddata-bo(18517)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517",
            },
            {
               name: "OpenPKG-SA-2004.053",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENPKG",
               ],
               url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
            },
            {
               name: "HPSBMA01212",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://www.securityfocus.com/advisories/9028",
            },
            {
               name: "RHSA-2004:687",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1065",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2005:032",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
                  },
                  {
                     name: "SUSE-SA:2005:002",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
                  },
                  {
                     name: "http://www.php.net/release_4_3_10.php",
                     refsource: "CONFIRM",
                     url: "http://www.php.net/release_4_3_10.php",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10877",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877",
                  },
                  {
                     name: "MDKSA-2004:151",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
                  },
                  {
                     name: "FLSA:2344",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
                  },
                  {
                     name: "php-exifreaddata-bo(18517)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517",
                  },
                  {
                     name: "OpenPKG-SA-2004.053",
                     refsource: "OPENPKG",
                     url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
                  },
                  {
                     name: "HPSBMA01212",
                     refsource: "HP",
                     url: "http://www.securityfocus.com/advisories/9028",
                  },
                  {
                     name: "RHSA-2004:687",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1065",
      datePublished: "2004-12-22T05:00:00",
      dateReserved: "2004-11-23T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.815Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1069 (GCVE-0-2004-1069)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.704Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
               },
               {
                  name: "[linux-kernel] 20041114 [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=linux-kernel&m=110045613004761",
               },
               {
                  name: "linux-sockdgramsendmsg-race-condition(18312)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
            },
            {
               name: "[linux-kernel] 20041114 [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://marc.info/?l=linux-kernel&m=110045613004761",
            },
            {
               name: "linux-sockdgramsendmsg-race-condition(18312)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1069",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
                  },
                  {
                     name: "[linux-kernel] 20041114 [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using",
                     refsource: "MLIST",
                     url: "http://marc.info/?l=linux-kernel&m=110045613004761",
                  },
                  {
                     name: "linux-sockdgramsendmsg-race-condition(18312)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1069",
      datePublished: "2004-12-01T05:00:00",
      dateReserved: "2004-11-29T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.704Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1019 (GCVE-0-2004-1019)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.862Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2005:032",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
               },
               {
                  name: "php-unserialize-code-execution(18514)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514",
               },
               {
                  name: "SUSE-SU-2015:0365",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html",
               },
               {
                  name: "SUSE-SA:2005:002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.php.net/release_4_3_10.php",
               },
               {
                  name: "openSUSE-SU-2015:0325",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html",
               },
               {
                  name: "oval:org.mitre.oval:def:10511",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511",
               },
               {
                  name: "RHSA-2005:816",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-816.html",
               },
               {
                  name: "MDKSA-2004:151",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.hardened-php.net/advisories/012004.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
               },
               {
                  name: "FLSA:2344",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
               },
               {
                  name: "OpenPKG-SA-2004.053",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENPKG",
                     "x_transferred",
                  ],
                  url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
               },
               {
                  name: "HPSBMA01212",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/advisories/9028",
               },
               {
                  name: "RHSA-2004:687",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
               },
               {
                  name: "20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger \"information disclosure, double-free and negative reference index array underflow\" results.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2005:032",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
            },
            {
               name: "php-unserialize-code-execution(18514)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514",
            },
            {
               name: "SUSE-SU-2015:0365",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html",
            },
            {
               name: "SUSE-SA:2005:002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.php.net/release_4_3_10.php",
            },
            {
               name: "openSUSE-SU-2015:0325",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html",
            },
            {
               name: "oval:org.mitre.oval:def:10511",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511",
            },
            {
               name: "RHSA-2005:816",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-816.html",
            },
            {
               name: "MDKSA-2004:151",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.hardened-php.net/advisories/012004.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
            },
            {
               name: "FLSA:2344",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
            },
            {
               name: "OpenPKG-SA-2004.053",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENPKG",
               ],
               url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
            },
            {
               name: "HPSBMA01212",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://www.securityfocus.com/advisories/9028",
            },
            {
               name: "RHSA-2004:687",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
            },
            {
               name: "20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1019",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger \"information disclosure, double-free and negative reference index array underflow\" results.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2005:032",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
                  },
                  {
                     name: "php-unserialize-code-execution(18514)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514",
                  },
                  {
                     name: "SUSE-SU-2015:0365",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html",
                  },
                  {
                     name: "SUSE-SA:2005:002",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
                  },
                  {
                     name: "http://www.php.net/release_4_3_10.php",
                     refsource: "CONFIRM",
                     url: "http://www.php.net/release_4_3_10.php",
                  },
                  {
                     name: "openSUSE-SU-2015:0325",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10511",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511",
                  },
                  {
                     name: "RHSA-2005:816",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-816.html",
                  },
                  {
                     name: "MDKSA-2004:151",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
                  },
                  {
                     name: "http://www.hardened-php.net/advisories/012004.txt",
                     refsource: "MISC",
                     url: "http://www.hardened-php.net/advisories/012004.txt",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
                  },
                  {
                     name: "FLSA:2344",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
                  },
                  {
                     name: "OpenPKG-SA-2004.053",
                     refsource: "OPENPKG",
                     url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
                  },
                  {
                     name: "HPSBMA01212",
                     refsource: "HP",
                     url: "http://www.securityfocus.com/advisories/9028",
                  },
                  {
                     name: "RHSA-2004:687",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
                  },
                  {
                     name: "20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1019",
      datePublished: "2004-12-22T05:00:00",
      dateReserved: "2004-11-04T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.862Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0814 (GCVE-0-2004-0814)
Vulnerability from cvelistv5
Published
2004-10-28 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.833Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
               },
               {
                  name: "FLSA:2336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
               },
               {
                  name: "linux-tiocsetd-race-condition(17816)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816",
               },
               {
                  name: "20041020 CAN-2004-0814: Linux terminal layer races",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/379005",
               },
               {
                  name: "11492",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11492",
               },
               {
                  name: "11491",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11491",
               },
               {
                  name: "RHSA-2005:293",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672",
               },
               {
                  name: "oval:org.mitre.oval:def:10728",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
            },
            {
               name: "FLSA:2336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
            },
            {
               name: "linux-tiocsetd-race-condition(17816)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816",
            },
            {
               name: "20041020 CAN-2004-0814: Linux terminal layer races",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/379005",
            },
            {
               name: "11492",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11492",
            },
            {
               name: "11491",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11491",
            },
            {
               name: "RHSA-2005:293",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672",
            },
            {
               name: "oval:org.mitre.oval:def:10728",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0814",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110",
                     refsource: "CONFIRM",
                     url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
                  },
                  {
                     name: "FLSA:2336",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
                  },
                  {
                     name: "linux-tiocsetd-race-condition(17816)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816",
                  },
                  {
                     name: "20041020 CAN-2004-0814: Linux terminal layer races",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/379005",
                  },
                  {
                     name: "11492",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11492",
                  },
                  {
                     name: "11491",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11491",
                  },
                  {
                     name: "RHSA-2005:293",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
                  },
                  {
                     name: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672",
                     refsource: "CONFIRM",
                     url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10728",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0814",
      datePublished: "2004-10-28T04:00:00",
      dateReserved: "2004-08-25T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.833Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0754 (GCVE-0-2005-0754)
Vulnerability from cvelistv5
Published
2005-04-24 04:00
Modified
2024-08-07 21:28
Severity ?
Summary
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T21:28:27.162Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.kde.org/info/security/advisory-20050420-1.txt",
               },
               {
                  name: "20050422 [KDE Security Advisory]: Kommander untrusted code execution",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2",
               },
               {
                  name: "15060",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/15060",
               },
               {
                  name: "13313",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/13313",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-04-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-10-17T13:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.kde.org/info/security/advisory-20050420-1.txt",
            },
            {
               name: "20050422 [KDE Security Advisory]: Kommander untrusted code execution",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2",
            },
            {
               name: "15060",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/15060",
            },
            {
               name: "13313",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/13313",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2005-0754",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.kde.org/info/security/advisory-20050420-1.txt",
                     refsource: "CONFIRM",
                     url: "http://www.kde.org/info/security/advisory-20050420-1.txt",
                  },
                  {
                     name: "20050422 [KDE Security Advisory]: Kommander untrusted code execution",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2",
                  },
                  {
                     name: "15060",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/15060",
                  },
                  {
                     name: "13313",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/13313",
                  },
                  {
                     name: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff",
                     refsource: "CONFIRM",
                     url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2005-0754",
      datePublished: "2005-04-24T04:00:00",
      dateReserved: "2005-03-17T00:00:00",
      dateUpdated: "2024-08-07T21:28:27.162Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-5649 (GCVE-0-2006-5649)
Vulnerability from cvelistv5
Published
2006-12-14 00:00
Modified
2025-04-03 15:29
Summary
Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
References
http://www.novell.com/linux/security/advisories/2006_79_kernel.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/23361third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/23384third-party-advisory, x_refsource_SECUNIA
http://www.us.debian.org/security/2006/dsa-1237vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/23474third-party-advisory, x_refsource_SECUNIA
http://www.us.debian.org/security/2006/dsa-1233vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/23370third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-395-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/21523vdb-entry, x_refsource_BID
http://secunia.com/advisories/23395third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T19:55:54.145Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "SUSE-SA:2006:079",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
               },
               {
                  name: "23361",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23361",
               },
               {
                  name: "23384",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23384",
               },
               {
                  name: "DSA-1237",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.us.debian.org/security/2006/dsa-1237",
               },
               {
                  name: "23474",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23474",
               },
               {
                  name: "DSA-1233",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.us.debian.org/security/2006/dsa-1233",
               },
               {
                  name: "23370",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23370",
               },
               {
                  name: "USN-395-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-395-1",
               },
               {
                  name: "21523",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/21523",
               },
               {
                  name: "23395",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23395",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 5.5,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2006-5649",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-03T15:27:45.836399Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-400",
                        description: "CWE-400 Uncontrolled Resource Consumption",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-03T15:29:02.401Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-12-13T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Unspecified vulnerability in the \"alignment check exception handling\" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2006-12-22T10:00:00.000Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "SUSE-SA:2006:079",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
            },
            {
               name: "23361",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23361",
            },
            {
               name: "23384",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23384",
            },
            {
               name: "DSA-1237",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.us.debian.org/security/2006/dsa-1237",
            },
            {
               name: "23474",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23474",
            },
            {
               name: "DSA-1233",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.us.debian.org/security/2006/dsa-1233",
            },
            {
               name: "23370",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23370",
            },
            {
               name: "USN-395-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-395-1",
            },
            {
               name: "21523",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/21523",
            },
            {
               name: "23395",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23395",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-5649",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Unspecified vulnerability in the \"alignment check exception handling\" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "SUSE-SA:2006:079",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
                  },
                  {
                     name: "23361",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23361",
                  },
                  {
                     name: "23384",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23384",
                  },
                  {
                     name: "DSA-1237",
                     refsource: "DEBIAN",
                     url: "http://www.us.debian.org/security/2006/dsa-1237",
                  },
                  {
                     name: "23474",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23474",
                  },
                  {
                     name: "DSA-1233",
                     refsource: "DEBIAN",
                     url: "http://www.us.debian.org/security/2006/dsa-1233",
                  },
                  {
                     name: "23370",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23370",
                  },
                  {
                     name: "USN-395-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-395-1",
                  },
                  {
                     name: "21523",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/21523",
                  },
                  {
                     name: "23395",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23395",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-5649",
      datePublished: "2006-12-14T00:00:00.000Z",
      dateReserved: "2006-11-01T00:00:00.000Z",
      dateUpdated: "2025-04-03T15:29:02.401Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0891 (GCVE-0-2004-0891)
Vulnerability from cvelistv5
Published
2004-10-21 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.791Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "gaim-msn-slp-dos(17787)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787",
               },
               {
                  name: "FLSA:2188",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188",
               },
               {
                  name: "GLSA-200410-23",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://gaim.sourceforge.net/security/?id=9",
               },
               {
                  name: "oval:org.mitre.oval:def:11790",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790",
               },
               {
                  name: "USN-8-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-8-1/",
               },
               {
                  name: "gaim-file-transfer-dos(17790)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790",
               },
               {
                  name: "RHSA-2004:604",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-604.html",
               },
               {
                  name: "gaim-msn-slp-bo(17786)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an \"unexpected sequence of MSNSLP messages\" that results in an unbounded copy operation that writes to the wrong buffer.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "gaim-msn-slp-dos(17787)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787",
            },
            {
               name: "FLSA:2188",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188",
            },
            {
               name: "GLSA-200410-23",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://gaim.sourceforge.net/security/?id=9",
            },
            {
               name: "oval:org.mitre.oval:def:11790",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790",
            },
            {
               name: "USN-8-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-8-1/",
            },
            {
               name: "gaim-file-transfer-dos(17790)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790",
            },
            {
               name: "RHSA-2004:604",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-604.html",
            },
            {
               name: "gaim-msn-slp-bo(17786)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0891",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an \"unexpected sequence of MSNSLP messages\" that results in an unbounded copy operation that writes to the wrong buffer.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "gaim-msn-slp-dos(17787)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787",
                  },
                  {
                     name: "FLSA:2188",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188",
                  },
                  {
                     name: "GLSA-200410-23",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml",
                  },
                  {
                     name: "http://gaim.sourceforge.net/security/?id=9",
                     refsource: "CONFIRM",
                     url: "http://gaim.sourceforge.net/security/?id=9",
                  },
                  {
                     name: "oval:org.mitre.oval:def:11790",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790",
                  },
                  {
                     name: "USN-8-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-8-1/",
                  },
                  {
                     name: "gaim-file-transfer-dos(17790)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790",
                  },
                  {
                     name: "RHSA-2004:604",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-604.html",
                  },
                  {
                     name: "gaim-msn-slp-bo(17786)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0891",
      datePublished: "2004-10-21T04:00:00",
      dateReserved: "2004-09-22T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.791Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2008-2808 (GCVE-0-2008-2808)
Vulnerability from cvelistv5
Published
2008-07-07 23:00
Modified
2024-08-07 09:14
Severity ?
Summary
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
References
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.htmlvendor-advisory, x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2008-0549.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2009/dsa-1697vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/31021third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/30898third-party-advisory, x_refsource_SECUNIA
http://wiki.rpath.com/Advisories:rPSA-2008-0216x_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-2646x_refsource_CONFIRM
http://secunia.com/advisories/30949third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152vendor-advisory, x_refsource_SLACKWARE
http://www.vupen.com/english/advisories/2009/0977vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31069third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31008third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31377third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0616.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2008/1993/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31023third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/30038vdb-entry, x_refsource_BID
http://www.debian.org/security/2008/dsa-1607vendor-advisory, x_refsource_DEBIAN
http://security.gentoo.org/glsa/glsa-200808-03.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/31005third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33433third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.htmlvendor-advisory, x_refsource_FEDORA
http://www.securitytracker.com/id?1020419vdb-entry, x_refsource_SECTRACK
http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15x_refsource_CONFIRM
http://secunia.com/advisories/31183third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30903third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0547.htmlvendor-advisory, x_refsource_REDHAT
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.htmlvendor-advisory, x_refsource_FEDORA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1vendor-advisory, x_refsource_SUNALERT
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911vendor-advisory, x_refsource_SLACKWARE
http://www.debian.org/security/2008/dsa-1615vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/31195third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31076third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-619-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/30911third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0569.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/30878third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/494080/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.mozilla.org/security/announce/2008/mfsa2008-30.htmlx_refsource_CONFIRM
https://bugzilla.mozilla.org/show_bug.cgi?id=411433x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/34501third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:136vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T09:14:14.873Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "SUSE-SA:2008:034",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html",
               },
               {
                  name: "RHSA-2008:0549",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html",
               },
               {
                  name: "DSA-1697",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2009/dsa-1697",
               },
               {
                  name: "31021",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31021",
               },
               {
                  name: "oval:org.mitre.oval:def:9668",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668",
               },
               {
                  name: "30898",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30898",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.rpath.com/browse/RPL-2646",
               },
               {
                  name: "30949",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30949",
               },
               {
                  name: "SSA:2008-191-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152",
               },
               {
                  name: "ADV-2009-0977",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2009/0977",
               },
               {
                  name: "31069",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31069",
               },
               {
                  name: "31008",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31008",
               },
               {
                  name: "31377",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31377",
               },
               {
                  name: "RHSA-2008:0616",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html",
               },
               {
                  name: "ADV-2008-1993",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1993/references",
               },
               {
                  name: "31023",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31023",
               },
               {
                  name: "30038",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/30038",
               },
               {
                  name: "DSA-1607",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2008/dsa-1607",
               },
               {
                  name: "GLSA-200808-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200808-03.xml",
               },
               {
                  name: "31005",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31005",
               },
               {
                  name: "33433",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33433",
               },
               {
                  name: "FEDORA-2008-6127",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html",
               },
               {
                  name: "1020419",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1020419",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15",
               },
               {
                  name: "31183",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31183",
               },
               {
                  name: "30903",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30903",
               },
               {
                  name: "RHSA-2008:0547",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html",
               },
               {
                  name: "FEDORA-2008-6193",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html",
               },
               {
                  name: "256408",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1",
               },
               {
                  name: "SSA:2008-191",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911",
               },
               {
                  name: "DSA-1615",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2008/dsa-1615",
               },
               {
                  name: "31195",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31195",
               },
               {
                  name: "31076",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31076",
               },
               {
                  name: "USN-619-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-619-1",
               },
               {
                  name: "30911",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30911",
               },
               {
                  name: "RHSA-2008:0569",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html",
               },
               {
                  name: "30878",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30878",
               },
               {
                  name: "20080708 rPSA-2008-0216-1 firefox",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433",
               },
               {
                  name: "FEDORA-2008-6196",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html",
               },
               {
                  name: "34501",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34501",
               },
               {
                  name: "MDVSA-2008:136",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2008-07-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-11T19:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "SUSE-SA:2008:034",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html",
            },
            {
               name: "RHSA-2008:0549",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html",
            },
            {
               name: "DSA-1697",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2009/dsa-1697",
            },
            {
               name: "31021",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31021",
            },
            {
               name: "oval:org.mitre.oval:def:9668",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668",
            },
            {
               name: "30898",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30898",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.rpath.com/browse/RPL-2646",
            },
            {
               name: "30949",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30949",
            },
            {
               name: "SSA:2008-191-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152",
            },
            {
               name: "ADV-2009-0977",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2009/0977",
            },
            {
               name: "31069",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31069",
            },
            {
               name: "31008",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31008",
            },
            {
               name: "31377",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31377",
            },
            {
               name: "RHSA-2008:0616",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html",
            },
            {
               name: "ADV-2008-1993",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1993/references",
            },
            {
               name: "31023",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31023",
            },
            {
               name: "30038",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/30038",
            },
            {
               name: "DSA-1607",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2008/dsa-1607",
            },
            {
               name: "GLSA-200808-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200808-03.xml",
            },
            {
               name: "31005",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31005",
            },
            {
               name: "33433",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33433",
            },
            {
               name: "FEDORA-2008-6127",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html",
            },
            {
               name: "1020419",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1020419",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15",
            },
            {
               name: "31183",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31183",
            },
            {
               name: "30903",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30903",
            },
            {
               name: "RHSA-2008:0547",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html",
            },
            {
               name: "FEDORA-2008-6193",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html",
            },
            {
               name: "256408",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1",
            },
            {
               name: "SSA:2008-191",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911",
            },
            {
               name: "DSA-1615",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2008/dsa-1615",
            },
            {
               name: "31195",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31195",
            },
            {
               name: "31076",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31076",
            },
            {
               name: "USN-619-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-619-1",
            },
            {
               name: "30911",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30911",
            },
            {
               name: "RHSA-2008:0569",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html",
            },
            {
               name: "30878",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30878",
            },
            {
               name: "20080708 rPSA-2008-0216-1 firefox",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433",
            },
            {
               name: "FEDORA-2008-6196",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html",
            },
            {
               name: "34501",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34501",
            },
            {
               name: "MDVSA-2008:136",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2008-2808",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "SUSE-SA:2008:034",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html",
                  },
                  {
                     name: "RHSA-2008:0549",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html",
                  },
                  {
                     name: "DSA-1697",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2009/dsa-1697",
                  },
                  {
                     name: "31021",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31021",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9668",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668",
                  },
                  {
                     name: "30898",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30898",
                  },
                  {
                     name: "http://wiki.rpath.com/Advisories:rPSA-2008-0216",
                     refsource: "CONFIRM",
                     url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216",
                  },
                  {
                     name: "https://issues.rpath.com/browse/RPL-2646",
                     refsource: "CONFIRM",
                     url: "https://issues.rpath.com/browse/RPL-2646",
                  },
                  {
                     name: "30949",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30949",
                  },
                  {
                     name: "SSA:2008-191-03",
                     refsource: "SLACKWARE",
                     url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152",
                  },
                  {
                     name: "ADV-2009-0977",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2009/0977",
                  },
                  {
                     name: "31069",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31069",
                  },
                  {
                     name: "31008",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31008",
                  },
                  {
                     name: "31377",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31377",
                  },
                  {
                     name: "RHSA-2008:0616",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html",
                  },
                  {
                     name: "ADV-2008-1993",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1993/references",
                  },
                  {
                     name: "31023",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31023",
                  },
                  {
                     name: "30038",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/30038",
                  },
                  {
                     name: "DSA-1607",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2008/dsa-1607",
                  },
                  {
                     name: "GLSA-200808-03",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200808-03.xml",
                  },
                  {
                     name: "31005",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31005",
                  },
                  {
                     name: "33433",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/33433",
                  },
                  {
                     name: "FEDORA-2008-6127",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html",
                  },
                  {
                     name: "1020419",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1020419",
                  },
                  {
                     name: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15",
                     refsource: "CONFIRM",
                     url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15",
                  },
                  {
                     name: "31183",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31183",
                  },
                  {
                     name: "30903",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30903",
                  },
                  {
                     name: "RHSA-2008:0547",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html",
                  },
                  {
                     name: "FEDORA-2008-6193",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html",
                  },
                  {
                     name: "256408",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1",
                  },
                  {
                     name: "SSA:2008-191",
                     refsource: "SLACKWARE",
                     url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911",
                  },
                  {
                     name: "DSA-1615",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2008/dsa-1615",
                  },
                  {
                     name: "31195",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31195",
                  },
                  {
                     name: "31076",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31076",
                  },
                  {
                     name: "USN-619-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-619-1",
                  },
                  {
                     name: "30911",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30911",
                  },
                  {
                     name: "RHSA-2008:0569",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html",
                  },
                  {
                     name: "30878",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30878",
                  },
                  {
                     name: "20080708 rPSA-2008-0216-1 firefox",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded",
                  },
                  {
                     name: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html",
                     refsource: "CONFIRM",
                     url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html",
                  },
                  {
                     name: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433",
                  },
                  {
                     name: "FEDORA-2008-6196",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html",
                  },
                  {
                     name: "34501",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/34501",
                  },
                  {
                     name: "MDVSA-2008:136",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2008-2808",
      datePublished: "2008-07-07T23:00:00",
      dateReserved: "2008-06-20T00:00:00",
      dateUpdated: "2024-08-07T09:14:14.873Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2009-3232 (GCVE-0-2009-3232)
Vulnerability from cvelistv5
Published
2009-09-17 10:00
Modified
2024-08-07 06:22
Severity ?
Summary
pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an "empty selection" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927x_refsource_CONFIRM
https://launchpad.net/bugs/410171x_refsource_CONFIRM
http://secunia.com/advisories/36620third-party-advisory, x_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2009/09/08/7mailing-list, x_refsource_MLIST
http://www.securityfocus.com/bid/36306vdb-entry, x_refsource_BID
https://usn.ubuntu.com/828-1/vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T06:22:23.335Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://launchpad.net/bugs/410171",
               },
               {
                  name: "36620",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/36620",
               },
               {
                  name: "[oss-security] 20090908 CVE request - Debian/Ubuntu PAM auth module selection",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2009/09/08/7",
               },
               {
                  name: "36306",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/36306",
               },
               {
                  name: "USN-828-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/828-1/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2009-09-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an \"empty selection\" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://launchpad.net/bugs/410171",
            },
            {
               name: "36620",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/36620",
            },
            {
               name: "[oss-security] 20090908 CVE request - Debian/Ubuntu PAM auth module selection",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2009/09/08/7",
            },
            {
               name: "36306",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/36306",
            },
            {
               name: "USN-828-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/828-1/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2009-3232",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an \"empty selection\" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927",
                     refsource: "CONFIRM",
                     url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927",
                  },
                  {
                     name: "https://launchpad.net/bugs/410171",
                     refsource: "CONFIRM",
                     url: "https://launchpad.net/bugs/410171",
                  },
                  {
                     name: "36620",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/36620",
                  },
                  {
                     name: "[oss-security] 20090908 CVE request - Debian/Ubuntu PAM auth module selection",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2009/09/08/7",
                  },
                  {
                     name: "36306",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/36306",
                  },
                  {
                     name: "USN-828-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/828-1/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2009-3232",
      datePublished: "2009-09-17T10:00:00",
      dateReserved: "2009-09-16T00:00:00",
      dateUpdated: "2024-08-07T06:22:23.335Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-5159 (GCVE-0-2007-5159)
Vulnerability from cvelistv5
Published
2007-10-01 00:00
Modified
2024-09-16 18:24
Severity ?
Summary
The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T15:24:42.139Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FEDORA-2007-2295",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651",
               },
               {
                  name: "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html",
               },
               {
                  name: "26938",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26938",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2007-10-01T00:00:00Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FEDORA-2007-2295",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651",
            },
            {
               name: "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html",
            },
            {
               name: "26938",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26938",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-5159",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FEDORA-2007-2295",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=298651",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651",
                  },
                  {
                     name: "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)",
                     refsource: "MLIST",
                     url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html",
                  },
                  {
                     name: "26938",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26938",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-5159",
      datePublished: "2007-10-01T00:00:00Z",
      dateReserved: "2007-09-30T00:00:00Z",
      dateUpdated: "2024-09-16T18:24:53.206Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0802 (GCVE-0-2004-0802)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.483Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html",
               },
               {
                  name: "201611",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
               },
               {
                  name: "CLA-2004:870",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
               },
               {
                  name: "imlib2-bmp-bo(17183)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183",
               },
               {
                  name: "11084",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11084",
               },
               {
                  name: "MDKSA-2004:089",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089",
               },
               {
                  name: "GLSA-200409-12",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-09-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html",
            },
            {
               name: "201611",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
            },
            {
               name: "CLA-2004:870",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
            },
            {
               name: "imlib2-bmp-bo(17183)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183",
            },
            {
               name: "11084",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11084",
            },
            {
               name: "MDKSA-2004:089",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089",
            },
            {
               name: "GLSA-200409-12",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0802",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup",
                     refsource: "MISC",
                     url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup",
                  },
                  {
                     name: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html",
                     refsource: "CONFIRM",
                     url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html",
                  },
                  {
                     name: "201611",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
                  },
                  {
                     name: "CLA-2004:870",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
                  },
                  {
                     name: "imlib2-bmp-bo(17183)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183",
                  },
                  {
                     name: "11084",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11084",
                  },
                  {
                     name: "MDKSA-2004:089",
                     refsource: "MANDRAKE",
                     url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089",
                  },
                  {
                     name: "GLSA-200409-12",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0802",
      datePublished: "2004-09-24T04:00:00",
      dateReserved: "2004-08-25T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.483Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0883 (GCVE-0-2004-0883)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:31
Severity ?
Summary
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
References
http://secunia.com/advisories/20163third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/11695vdb-entry, x_refsource_BID
http://www.debian.org/security/2006/dsa-1082vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022vendor-advisory, x_refsource_MANDRAKE
http://marc.info/?l=bugtraq&m=110072140811965&w=2mailing-list, x_refsource_BUGTRAQ
https://bugzilla.fedora.us/show_bug.cgi?id=2336vendor-advisory, x_refsource_FEDORA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330vdb-entry, signature, x_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilities/18136vdb-entry, x_refsource_XF
http://security.e-matters.de/advisories/142004.htmlx_refsource_MISC
http://www.debian.org/security/2006/dsa-1070vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2004-537.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/20162third-party-advisory, x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/726198third-party-advisory, x_refsource_CERT-VN
http://www.debian.org/security/2006/dsa-1067vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2006/dsa-1069vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/18135vdb-entry, x_refsource_XF
http://www.redhat.com/support/errata/RHSA-2004-505.htmlvendor-advisory, x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/18134vdb-entry, x_refsource_XF
http://secunia.com/advisories/20202third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2004-504.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=110082989725345&w=2mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/13232/third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20338third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.956Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20163",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20163",
               },
               {
                  name: "11695",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11695",
               },
               {
                  name: "DSA-1082",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1082",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
               },
               {
                  name: "FLSA:2336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
               },
               {
                  name: "oval:org.mitre.oval:def:10330",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330",
               },
               {
                  name: "linux-smbreceivetrans2-dos(18136)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/142004.html",
               },
               {
                  name: "DSA-1070",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1070",
               },
               {
                  name: "RHSA-2004:537",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
               },
               {
                  name: "20162",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20162",
               },
               {
                  name: "VU#726198",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/726198",
               },
               {
                  name: "DSA-1067",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1067",
               },
               {
                  name: "DSA-1069",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1069",
               },
               {
                  name: "linux-smbprocreadxdata-dos(18135)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135",
               },
               {
                  name: "RHSA-2004:505",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
               },
               {
                  name: "linux-smb-response-dos(18134)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134",
               },
               {
                  name: "20202",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20202",
               },
               {
                  name: "RHSA-2004:504",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
               },
               {
                  name: "20041118 [USN-30-1] Linux kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2",
               },
               {
                  name: "13232",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/13232/",
               },
               {
                  name: "20338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20338",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20163",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20163",
            },
            {
               name: "11695",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11695",
            },
            {
               name: "DSA-1082",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1082",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
            },
            {
               name: "FLSA:2336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
            },
            {
               name: "oval:org.mitre.oval:def:10330",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330",
            },
            {
               name: "linux-smbreceivetrans2-dos(18136)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/142004.html",
            },
            {
               name: "DSA-1070",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1070",
            },
            {
               name: "RHSA-2004:537",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
            },
            {
               name: "20162",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20162",
            },
            {
               name: "VU#726198",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/726198",
            },
            {
               name: "DSA-1067",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1067",
            },
            {
               name: "DSA-1069",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1069",
            },
            {
               name: "linux-smbprocreadxdata-dos(18135)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135",
            },
            {
               name: "RHSA-2004:505",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
            },
            {
               name: "linux-smb-response-dos(18134)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134",
            },
            {
               name: "20202",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20202",
            },
            {
               name: "RHSA-2004:504",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
            },
            {
               name: "20041118 [USN-30-1] Linux kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2",
            },
            {
               name: "13232",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/13232/",
            },
            {
               name: "20338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20338",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0883",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20163",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20163",
                  },
                  {
                     name: "11695",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11695",
                  },
                  {
                     name: "DSA-1082",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1082",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
                  },
                  {
                     name: "FLSA:2336",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10330",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330",
                  },
                  {
                     name: "linux-smbreceivetrans2-dos(18136)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136",
                  },
                  {
                     name: "http://security.e-matters.de/advisories/142004.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/142004.html",
                  },
                  {
                     name: "DSA-1070",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1070",
                  },
                  {
                     name: "RHSA-2004:537",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
                  },
                  {
                     name: "20162",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20162",
                  },
                  {
                     name: "VU#726198",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/726198",
                  },
                  {
                     name: "DSA-1067",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1067",
                  },
                  {
                     name: "DSA-1069",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1069",
                  },
                  {
                     name: "linux-smbprocreadxdata-dos(18135)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135",
                  },
                  {
                     name: "RHSA-2004:505",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
                  },
                  {
                     name: "linux-smb-response-dos(18134)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134",
                  },
                  {
                     name: "20202",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20202",
                  },
                  {
                     name: "RHSA-2004:504",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
                  },
                  {
                     name: "20041118 [USN-30-1] Linux kernel vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2",
                  },
                  {
                     name: "13232",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/13232/",
                  },
                  {
                     name: "20338",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20338",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0883",
      datePublished: "2004-12-01T05:00:00",
      dateReserved: "2004-09-22T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.956Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0988 (GCVE-0-2005-0988)
Vulnerability from cvelistv5
Published
2005-04-06 04:00
Modified
2024-08-07 21:35
Severity ?
Summary
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
References
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://secunia.com/advisories/22033third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3101vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/21253third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-752vendor-advisory, x_refsource_DEBIAN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1vendor-advisory, x_refsource_SUNALERT
http://rhn.redhat.com/errata/RHSA-2005-357.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/19289vdb-entry, x_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA06-214A.htmlthird-party-advisory, x_refsource_CERT
http://www.securityfocus.com/bid/12996vdb-entry, x_refsource_BID
http://www.osvdb.org/15487vdb-entry, x_refsource_OSVDB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169vdb-entry, signature, x_refsource_OVAL
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txtvendor-advisory, x_refsource_SCO
http://secunia.com/advisories/18100third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852vendor-advisory, x_refsource_SLACKWARE
http://www.securityfocus.com/archive/1/394965mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T21:35:59.902Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "APPLE-SA-2006-08-01",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html",
               },
               {
                  name: "22033",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/22033",
               },
               {
                  name: "ADV-2006-3101",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/3101",
               },
               {
                  name: "21253",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/21253",
               },
               {
                  name: "DSA-752",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-752",
               },
               {
                  name: "101816",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1",
               },
               {
                  name: "RHSA-2005:357",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2005-357.html",
               },
               {
                  name: "19289",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/19289",
               },
               {
                  name: "TA06-214A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html",
               },
               {
                  name: "12996",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/12996",
               },
               {
                  name: "15487",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/15487",
               },
               {
                  name: "oval:org.mitre.oval:def:765",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765",
               },
               {
                  name: "oval:org.mitre.oval:def:10242",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242",
               },
               {
                  name: "oval:org.mitre.oval:def:1169",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169",
               },
               {
                  name: "SCOSA-2005.58",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt",
               },
               {
                  name: "18100",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18100",
               },
               {
                  name: "SSA:2006-262",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852",
               },
               {
                  name: "20050404 gzip TOCTOU file-permissions vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/394965",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-04-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "APPLE-SA-2006-08-01",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html",
            },
            {
               name: "22033",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/22033",
            },
            {
               name: "ADV-2006-3101",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/3101",
            },
            {
               name: "21253",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/21253",
            },
            {
               name: "DSA-752",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-752",
            },
            {
               name: "101816",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1",
            },
            {
               name: "RHSA-2005:357",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2005-357.html",
            },
            {
               name: "19289",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/19289",
            },
            {
               name: "TA06-214A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html",
            },
            {
               name: "12996",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/12996",
            },
            {
               name: "15487",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/15487",
            },
            {
               name: "oval:org.mitre.oval:def:765",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765",
            },
            {
               name: "oval:org.mitre.oval:def:10242",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242",
            },
            {
               name: "oval:org.mitre.oval:def:1169",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169",
            },
            {
               name: "SCOSA-2005.58",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt",
            },
            {
               name: "18100",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18100",
            },
            {
               name: "SSA:2006-262",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852",
            },
            {
               name: "20050404 gzip TOCTOU file-permissions vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/394965",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-0988",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "APPLE-SA-2006-08-01",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html",
                  },
                  {
                     name: "22033",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/22033",
                  },
                  {
                     name: "ADV-2006-3101",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2006/3101",
                  },
                  {
                     name: "21253",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/21253",
                  },
                  {
                     name: "DSA-752",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2005/dsa-752",
                  },
                  {
                     name: "101816",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1",
                  },
                  {
                     name: "RHSA-2005:357",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2005-357.html",
                  },
                  {
                     name: "19289",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/19289",
                  },
                  {
                     name: "TA06-214A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html",
                  },
                  {
                     name: "12996",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/12996",
                  },
                  {
                     name: "15487",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/15487",
                  },
                  {
                     name: "oval:org.mitre.oval:def:765",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10242",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1169",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169",
                  },
                  {
                     name: "SCOSA-2005.58",
                     refsource: "SCO",
                     url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt",
                  },
                  {
                     name: "18100",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18100",
                  },
                  {
                     name: "SSA:2006-262",
                     refsource: "SLACKWARE",
                     url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852",
                  },
                  {
                     name: "20050404 gzip TOCTOU file-permissions vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/394965",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-0988",
      datePublished: "2005-04-06T04:00:00",
      dateReserved: "2005-04-06T00:00:00",
      dateUpdated: "2024-08-07T21:35:59.902Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-3597 (GCVE-0-2006-3597)
Vulnerability from cvelistv5
Published
2006-07-14 20:00
Modified
2024-08-07 18:39
Severity ?
Summary
passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the "Go Back" option after the final "Installation complete" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.
References
http://www.ubuntu.com/usn/usn-316-1vendor-advisory, x_refsource_UBUNTU
http://www.osvdb.org/27091vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/21022third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T18:39:52.553Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-316-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-316-1",
               },
               {
                  name: "27091",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/27091",
               },
               {
                  name: "21022",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/21022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-07-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the \"Go Back\" option after the final \"Installation complete\" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2006-07-26T09:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-316-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-316-1",
            },
            {
               name: "27091",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/27091",
            },
            {
               name: "21022",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/21022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-3597",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the \"Go Back\" option after the final \"Installation complete\" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-316-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-316-1",
                  },
                  {
                     name: "27091",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/27091",
                  },
                  {
                     name: "21022",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/21022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-3597",
      datePublished: "2006-07-14T20:00:00",
      dateReserved: "2006-07-14T00:00:00",
      dateUpdated: "2024-08-07T18:39:52.553Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1011 (GCVE-0-2004-1011)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.588Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/152004.html",
               },
               {
                  name: "cyrus-imap-username-bo(18198)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
               },
               {
                  name: "MDKSA-2004:139",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
               },
               {
                  name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
               },
               {
                  name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
               },
               {
                  name: "13274",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/13274/",
               },
               {
                  name: "GLSA-200411-34",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/152004.html",
            },
            {
               name: "cyrus-imap-username-bo(18198)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
            },
            {
               name: "MDKSA-2004:139",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
            },
            {
               name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
            },
            {
               name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
            },
            {
               name: "13274",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/13274/",
            },
            {
               name: "GLSA-200411-34",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1011",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://security.e-matters.de/advisories/152004.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/152004.html",
                  },
                  {
                     name: "cyrus-imap-username-bo(18198)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198",
                  },
                  {
                     name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                     refsource: "CONFIRM",
                     url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                  },
                  {
                     name: "MDKSA-2004:139",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
                  },
                  {
                     name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
                  },
                  {
                     name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
                     refsource: "MLIST",
                     url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
                  },
                  {
                     name: "13274",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/13274/",
                  },
                  {
                     name: "GLSA-200411-34",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1011",
      datePublished: "2004-12-01T05:00:00",
      dateReserved: "2004-11-04T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.588Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0077 (GCVE-0-2005-0077)
Vulnerability from cvelistv5
Published
2005-01-29 05:00
Modified
2024-08-07 20:57
Severity ?
Summary
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
References
http://securitytracker.com/id?1013007vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/426530/30/6600/threadedvendor-advisory, x_refsource_FEDORA
http://www.mandriva.com/security/advisories?name=MDKSA-2005:030vendor-advisory, x_refsource_MANDRAKE
https://exchange.xforce.ibmcloud.com/vulnerabilities/19068vdb-entry, x_refsource_XF
http://www.debian.org/security/2005/dsa-658vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/14015third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/bid/12360vdb-entry, x_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-200501-38.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/14050third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2005-072.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=110667936707597&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T20:57:41.090Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1013007",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1013007",
               },
               {
                  name: "FLSA-2006:178989",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded",
               },
               {
                  name: "MDKSA-2005:030",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030",
               },
               {
                  name: "dbi-library-file-overwrite(19068)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068",
               },
               {
                  name: "DSA-658",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-658",
               },
               {
                  name: "14015",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/14015",
               },
               {
                  name: "oval:org.mitre.oval:def:10552",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552",
               },
               {
                  name: "12360",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/12360",
               },
               {
                  name: "GLSA-200501-38",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml",
               },
               {
                  name: "14050",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/14050",
               },
               {
                  name: "RHSA-2005:072",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-072.html",
               },
               {
                  name: "20050125 [USN-70-1] Perl DBI module vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-01-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-19T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1013007",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1013007",
            },
            {
               name: "FLSA-2006:178989",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded",
            },
            {
               name: "MDKSA-2005:030",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030",
            },
            {
               name: "dbi-library-file-overwrite(19068)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068",
            },
            {
               name: "DSA-658",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-658",
            },
            {
               name: "14015",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/14015",
            },
            {
               name: "oval:org.mitre.oval:def:10552",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552",
            },
            {
               name: "12360",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/12360",
            },
            {
               name: "GLSA-200501-38",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml",
            },
            {
               name: "14050",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/14050",
            },
            {
               name: "RHSA-2005:072",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-072.html",
            },
            {
               name: "20050125 [USN-70-1] Perl DBI module vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-0077",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1013007",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1013007",
                  },
                  {
                     name: "FLSA-2006:178989",
                     refsource: "FEDORA",
                     url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded",
                  },
                  {
                     name: "MDKSA-2005:030",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030",
                  },
                  {
                     name: "dbi-library-file-overwrite(19068)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068",
                  },
                  {
                     name: "DSA-658",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2005/dsa-658",
                  },
                  {
                     name: "14015",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/14015",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10552",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552",
                  },
                  {
                     name: "12360",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/12360",
                  },
                  {
                     name: "GLSA-200501-38",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml",
                  },
                  {
                     name: "14050",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/14050",
                  },
                  {
                     name: "RHSA-2005:072",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-072.html",
                  },
                  {
                     name: "20050125 [USN-70-1] Perl DBI module vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-0077",
      datePublished: "2005-01-29T05:00:00",
      dateReserved: "2005-01-14T00:00:00",
      dateUpdated: "2024-08-07T20:57:41.090Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1015 (GCVE-0-2004-1015)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.635Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "cyrus-magic-plus-bo(18274)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
               },
               {
                  name: "MDKSA-2004:139",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
               },
               {
                  name: "[cyrus-announce] 20041123 Cyrus IMAPd 2.2.10 Released",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145",
               },
               {
                  name: "GLSA-200411-34",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "cyrus-magic-plus-bo(18274)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
            },
            {
               name: "MDKSA-2004:139",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
            },
            {
               name: "[cyrus-announce] 20041123 Cyrus IMAPd 2.2.10 Released",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145",
            },
            {
               name: "GLSA-200411-34",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1015",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "cyrus-magic-plus-bo(18274)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274",
                  },
                  {
                     name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                     refsource: "CONFIRM",
                     url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                  },
                  {
                     name: "MDKSA-2004:139",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
                  },
                  {
                     name: "[cyrus-announce] 20041123 Cyrus IMAPd 2.2.10 Released",
                     refsource: "MLIST",
                     url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145",
                  },
                  {
                     name: "GLSA-200411-34",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1015",
      datePublished: "2004-12-01T05:00:00",
      dateReserved: "2004-11-04T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.635Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-1183 (GCVE-0-2006-1183)
Vulnerability from cvelistv5
Published
2006-03-13 11:00
Modified
2024-08-07 17:03
Severity ?
Summary
The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.
References
https://usn.ubuntu.com/262-1/vendor-advisory, x_refsource_UBUNTU
https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606x_refsource_CONFIRM
http://www.securityfocus.com/bid/17086vdb-entry, x_refsource_BID
http://www.osvdb.org/23868vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/0927vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/25170vdb-entry, x_refsource_XF
http://securitytracker.com/id?1015761vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/19200third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T17:03:28.374Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-262-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/262-1/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606",
               },
               {
                  name: "17086",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/17086",
               },
               {
                  name: "23868",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/23868",
               },
               {
                  name: "ADV-2006-0927",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/0927",
               },
               {
                  name: "ubuntu-installer-password-disclosure(25170)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170",
               },
               {
                  name: "1015761",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1015761",
               },
               {
                  name: "19200",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19200",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-03-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-262-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/262-1/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606",
            },
            {
               name: "17086",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/17086",
            },
            {
               name: "23868",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/23868",
            },
            {
               name: "ADV-2006-0927",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/0927",
            },
            {
               name: "ubuntu-installer-password-disclosure(25170)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170",
            },
            {
               name: "1015761",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1015761",
            },
            {
               name: "19200",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19200",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-1183",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-262-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/262-1/",
                  },
                  {
                     name: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606",
                     refsource: "CONFIRM",
                     url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606",
                  },
                  {
                     name: "17086",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/17086",
                  },
                  {
                     name: "23868",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/23868",
                  },
                  {
                     name: "ADV-2006-0927",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2006/0927",
                  },
                  {
                     name: "ubuntu-installer-password-disclosure(25170)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170",
                  },
                  {
                     name: "1015761",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1015761",
                  },
                  {
                     name: "19200",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19200",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-1183",
      datePublished: "2006-03-13T11:00:00",
      dateReserved: "2006-03-13T00:00:00",
      dateUpdated: "2024-08-07T17:03:28.374Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-6235 (GCVE-0-2006-6235)
Vulnerability from cvelistv5
Published
2006-12-07 11:00
Modified
2024-08-07 20:19
Severity ?
Summary
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
References
http://securitytracker.com/id?1017349vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/23269third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/23303third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/453723/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/23255third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-393-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/23513third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/23284third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-393-2vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/23245third-party-advisory, x_refsource_SECUNIA
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.htmlmailing-list, x_refsource_MLIST
http://www.kb.cert.org/vuls/id/427009third-party-advisory, x_refsource_CERT-VN
http://www.novell.com/linux/security/advisories/2006_28_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2006-0754.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2006/dsa-1231vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/archive/1/453664/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/23335third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/23299third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/21462vdb-entry, x_refsource_BID
http://www.trustix.org/errata/2006/0070vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/23329third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200612-03.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/23259third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:228vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/23290third-party-advisory, x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-835x_refsource_CONFIRM
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.htmlvendor-advisory, x_refsource_SUSE
http://support.avaya.com/elmodocs2/security/ASA-2007-047.htmx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4881vdb-entry, x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/23250third-party-advisory, x_refsource_SECUNIA
ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.ascvendor-advisory, x_refsource_SGI
https://exchange.xforce.ibmcloud.com/vulnerabilities/30711vdb-entry, x_refsource_XF
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.htmlvendor-advisory, x_refsource_OPENPKG
http://secunia.com/advisories/24047third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T20:19:35.196Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1017349",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1017349",
               },
               {
                  name: "23269",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23269",
               },
               {
                  name: "23303",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23303",
               },
               {
                  name: "20061206 rPSA-2006-0227-1 gnupg",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded",
               },
               {
                  name: "23255",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23255",
               },
               {
                  name: "USN-393-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-393-1",
               },
               {
                  name: "23513",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23513",
               },
               {
                  name: "23284",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23284",
               },
               {
                  name: "USN-393-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-393-2",
               },
               {
                  name: "23245",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23245",
               },
               {
                  name: "[gnupg-announce] GnuPG: remotely controllable function pointer [CVE-2006-6235]",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html",
               },
               {
                  name: "VU#427009",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/427009",
               },
               {
                  name: "SUSE-SR:2006:028",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html",
               },
               {
                  name: "RHSA-2006:0754",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html",
               },
               {
                  name: "DSA-1231",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1231",
               },
               {
                  name: "20061206 GnuPG: remotely controllable function pointer [CVE-2006-6235]",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded",
               },
               {
                  name: "23335",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23335",
               },
               {
                  name: "23299",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23299",
               },
               {
                  name: "21462",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/21462",
               },
               {
                  name: "2006-0070",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2006/0070",
               },
               {
                  name: "23329",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23329",
               },
               {
                  name: "GLSA-200612-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200612-03.xml",
               },
               {
                  name: "23259",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23259",
               },
               {
                  name: "MDKSA-2006:228",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228",
               },
               {
                  name: "23290",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23290",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.rpath.com/browse/RPL-835",
               },
               {
                  name: "SUSE-SA:2006:075",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm",
               },
               {
                  name: "ADV-2006-4881",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/4881",
               },
               {
                  name: "oval:org.mitre.oval:def:11245",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245",
               },
               {
                  name: "23250",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23250",
               },
               {
                  name: "20061201-01-P",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc",
               },
               {
                  name: "gnupg-openpgp-code-execution(30711)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711",
               },
               {
                  name: "OpenPKG-SA-2006.037",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENPKG",
                     "x_transferred",
                  ],
                  url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html",
               },
               {
                  name: "24047",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24047",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A \"stack overwrite\" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-17T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1017349",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1017349",
            },
            {
               name: "23269",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23269",
            },
            {
               name: "23303",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23303",
            },
            {
               name: "20061206 rPSA-2006-0227-1 gnupg",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded",
            },
            {
               name: "23255",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23255",
            },
            {
               name: "USN-393-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-393-1",
            },
            {
               name: "23513",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23513",
            },
            {
               name: "23284",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23284",
            },
            {
               name: "USN-393-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-393-2",
            },
            {
               name: "23245",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23245",
            },
            {
               name: "[gnupg-announce] GnuPG: remotely controllable function pointer [CVE-2006-6235]",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html",
            },
            {
               name: "VU#427009",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/427009",
            },
            {
               name: "SUSE-SR:2006:028",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html",
            },
            {
               name: "RHSA-2006:0754",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html",
            },
            {
               name: "DSA-1231",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1231",
            },
            {
               name: "20061206 GnuPG: remotely controllable function pointer [CVE-2006-6235]",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded",
            },
            {
               name: "23335",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23335",
            },
            {
               name: "23299",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23299",
            },
            {
               name: "21462",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/21462",
            },
            {
               name: "2006-0070",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2006/0070",
            },
            {
               name: "23329",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23329",
            },
            {
               name: "GLSA-200612-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200612-03.xml",
            },
            {
               name: "23259",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23259",
            },
            {
               name: "MDKSA-2006:228",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228",
            },
            {
               name: "23290",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23290",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.rpath.com/browse/RPL-835",
            },
            {
               name: "SUSE-SA:2006:075",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm",
            },
            {
               name: "ADV-2006-4881",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/4881",
            },
            {
               name: "oval:org.mitre.oval:def:11245",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245",
            },
            {
               name: "23250",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23250",
            },
            {
               name: "20061201-01-P",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc",
            },
            {
               name: "gnupg-openpgp-code-execution(30711)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711",
            },
            {
               name: "OpenPKG-SA-2006.037",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENPKG",
               ],
               url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html",
            },
            {
               name: "24047",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24047",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-6235",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A \"stack overwrite\" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1017349",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1017349",
                  },
                  {
                     name: "23269",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23269",
                  },
                  {
                     name: "23303",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23303",
                  },
                  {
                     name: "20061206 rPSA-2006-0227-1 gnupg",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded",
                  },
                  {
                     name: "23255",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23255",
                  },
                  {
                     name: "USN-393-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-393-1",
                  },
                  {
                     name: "23513",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23513",
                  },
                  {
                     name: "23284",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23284",
                  },
                  {
                     name: "USN-393-2",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-393-2",
                  },
                  {
                     name: "23245",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23245",
                  },
                  {
                     name: "[gnupg-announce] GnuPG: remotely controllable function pointer [CVE-2006-6235]",
                     refsource: "MLIST",
                     url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html",
                  },
                  {
                     name: "VU#427009",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/427009",
                  },
                  {
                     name: "SUSE-SR:2006:028",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html",
                  },
                  {
                     name: "RHSA-2006:0754",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html",
                  },
                  {
                     name: "DSA-1231",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1231",
                  },
                  {
                     name: "20061206 GnuPG: remotely controllable function pointer [CVE-2006-6235]",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded",
                  },
                  {
                     name: "23335",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23335",
                  },
                  {
                     name: "23299",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23299",
                  },
                  {
                     name: "21462",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/21462",
                  },
                  {
                     name: "2006-0070",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2006/0070",
                  },
                  {
                     name: "23329",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23329",
                  },
                  {
                     name: "GLSA-200612-03",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200612-03.xml",
                  },
                  {
                     name: "23259",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23259",
                  },
                  {
                     name: "MDKSA-2006:228",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228",
                  },
                  {
                     name: "23290",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23290",
                  },
                  {
                     name: "https://issues.rpath.com/browse/RPL-835",
                     refsource: "CONFIRM",
                     url: "https://issues.rpath.com/browse/RPL-835",
                  },
                  {
                     name: "SUSE-SA:2006:075",
                     refsource: "SUSE",
                     url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html",
                  },
                  {
                     name: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm",
                  },
                  {
                     name: "ADV-2006-4881",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2006/4881",
                  },
                  {
                     name: "oval:org.mitre.oval:def:11245",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245",
                  },
                  {
                     name: "23250",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23250",
                  },
                  {
                     name: "20061201-01-P",
                     refsource: "SGI",
                     url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc",
                  },
                  {
                     name: "gnupg-openpgp-code-execution(30711)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711",
                  },
                  {
                     name: "OpenPKG-SA-2006.037",
                     refsource: "OPENPKG",
                     url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html",
                  },
                  {
                     name: "24047",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24047",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-6235",
      datePublished: "2006-12-07T11:00:00",
      dateReserved: "2006-12-02T00:00:00",
      dateUpdated: "2024-08-07T20:19:35.196Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1137 (GCVE-0-2004-1137)
Vulnerability from cvelistv5
Published
2004-12-15 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.857Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "oval:org.mitre.oval:def:11144",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
               },
               {
                  name: "FLSA:2336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
               },
               {
                  name: "SUSE-SA:2004:044",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
               },
               {
                  name: "RHSA-2005:092",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
               },
               {
                  name: "CLA-2005:930",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt",
               },
               {
                  name: "linux-igmpmarksources-dos(18482)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482",
               },
               {
                  name: "linux-ipmcsource-code-execution(18481)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "oval:org.mitre.oval:def:11144",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
            },
            {
               name: "FLSA:2336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
            },
            {
               name: "SUSE-SA:2004:044",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
            },
            {
               name: "RHSA-2005:092",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
            },
            {
               name: "CLA-2005:930",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt",
            },
            {
               name: "linux-igmpmarksources-dos(18482)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482",
            },
            {
               name: "linux-ipmcsource-code-execution(18481)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1137",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "oval:org.mitre.oval:def:11144",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
                  },
                  {
                     name: "FLSA:2336",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
                  },
                  {
                     name: "SUSE-SA:2004:044",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
                  },
                  {
                     name: "RHSA-2005:092",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
                  },
                  {
                     name: "CLA-2005:930",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
                  },
                  {
                     name: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt",
                     refsource: "MISC",
                     url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt",
                  },
                  {
                     name: "linux-igmpmarksources-dos(18482)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482",
                  },
                  {
                     name: "linux-ipmcsource-code-execution(18481)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1137",
      datePublished: "2004-12-15T05:00:00",
      dateReserved: "2004-12-06T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.857Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0989 (GCVE-0-2004-0989)
Vulnerability from cvelistv5
Published
2004-10-28 04:00
Modified
2024-08-08 00:38
Severity ?
Summary
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
References
http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://marc.info/?l=bugtraq&m=109880813013482&w=2mailing-list, x_refsource_BUGTRAQ
http://www.ciac.org/ciac/bulletins/p-029.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.osvdb.org/11179vdb-entry, x_refsource_OSVDB
http://securitytracker.com/id?1011941vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2004-615.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/11526vdb-entry, x_refsource_BID
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505vdb-entry, signature, x_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilities/17872vdb-entry, x_refsource_XF
http://www.redhat.com/support/errata/RHSA-2004-650.htmlvendor-advisory, x_refsource_REDHAT
http://www.gentoo.org/security/en/glsa/glsa-200411-05.xmlvendor-advisory, x_refsource_GENTOO
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890vendor-advisory, x_refsource_CONECTIVA
http://www.osvdb.org/11324vdb-entry, x_refsource_OSVDB
http://www.novell.com/linux/security/advisories/2005_01_sr.htmlvendor-advisory, x_refsource_SUSE
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173vdb-entry, signature, x_refsource_OVAL
https://www.ubuntu.com/usn/usn-89-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/13000third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2004/dsa-582vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/17870vdb-entry, x_refsource_XF
https://exchange.xforce.ibmcloud.com/vulnerabilities/17875vdb-entry, x_refsource_XF
http://www.osvdb.org/11180vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/17876vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:38:59.682Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "APPLE-SA-2005-01-25",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html",
               },
               {
                  name: "20041026 libxml2 remote buffer overflows (not in xml parsing code though)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2",
               },
               {
                  name: "P-029",
                  tags: [
                     "third-party-advisory",
                     "government-resource",
                     "x_refsource_CIAC",
                     "x_transferred",
                  ],
                  url: "http://www.ciac.org/ciac/bulletins/p-029.shtml",
               },
               {
                  name: "11179",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/11179",
               },
               {
                  name: "1011941",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1011941",
               },
               {
                  name: "RHSA-2004:615",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-615.html",
               },
               {
                  name: "11526",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11526",
               },
               {
                  name: "oval:org.mitre.oval:def:10505",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505",
               },
               {
                  name: "libxml2-nanoftp-file-bo(17872)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872",
               },
               {
                  name: "RHSA-2004:650",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-650.html",
               },
               {
                  name: "GLSA-200411-05",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml",
               },
               {
                  name: "CLA-2004:890",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890",
               },
               {
                  name: "11324",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/11324",
               },
               {
                  name: "SUSE-SR:2005:001",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
               },
               {
                  name: "oval:org.mitre.oval:def:1173",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173",
               },
               {
                  name: "USN-89-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-89-1/",
               },
               {
                  name: "13000",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/13000",
               },
               {
                  name: "DSA-582",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-582",
               },
               {
                  name: "libxml2-xmlnanoftpscanurl-bo(17870)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870",
               },
               {
                  name: "libxml2-xmlnanoftpscanproxy-bo(17875)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875",
               },
               {
                  name: "11180",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/11180",
               },
               {
                  name: "libxml2-nanohttp-file-bo(17876)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "APPLE-SA-2005-01-25",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html",
            },
            {
               name: "20041026 libxml2 remote buffer overflows (not in xml parsing code though)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2",
            },
            {
               name: "P-029",
               tags: [
                  "third-party-advisory",
                  "government-resource",
                  "x_refsource_CIAC",
               ],
               url: "http://www.ciac.org/ciac/bulletins/p-029.shtml",
            },
            {
               name: "11179",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/11179",
            },
            {
               name: "1011941",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1011941",
            },
            {
               name: "RHSA-2004:615",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-615.html",
            },
            {
               name: "11526",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11526",
            },
            {
               name: "oval:org.mitre.oval:def:10505",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505",
            },
            {
               name: "libxml2-nanoftp-file-bo(17872)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872",
            },
            {
               name: "RHSA-2004:650",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-650.html",
            },
            {
               name: "GLSA-200411-05",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml",
            },
            {
               name: "CLA-2004:890",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890",
            },
            {
               name: "11324",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/11324",
            },
            {
               name: "SUSE-SR:2005:001",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
            },
            {
               name: "oval:org.mitre.oval:def:1173",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173",
            },
            {
               name: "USN-89-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-89-1/",
            },
            {
               name: "13000",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/13000",
            },
            {
               name: "DSA-582",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-582",
            },
            {
               name: "libxml2-xmlnanoftpscanurl-bo(17870)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870",
            },
            {
               name: "libxml2-xmlnanoftpscanproxy-bo(17875)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875",
            },
            {
               name: "11180",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/11180",
            },
            {
               name: "libxml2-nanohttp-file-bo(17876)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0989",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "APPLE-SA-2005-01-25",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html",
                  },
                  {
                     name: "20041026 libxml2 remote buffer overflows (not in xml parsing code though)",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2",
                  },
                  {
                     name: "P-029",
                     refsource: "CIAC",
                     url: "http://www.ciac.org/ciac/bulletins/p-029.shtml",
                  },
                  {
                     name: "11179",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/11179",
                  },
                  {
                     name: "1011941",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1011941",
                  },
                  {
                     name: "RHSA-2004:615",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-615.html",
                  },
                  {
                     name: "11526",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11526",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10505",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505",
                  },
                  {
                     name: "libxml2-nanoftp-file-bo(17872)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872",
                  },
                  {
                     name: "RHSA-2004:650",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-650.html",
                  },
                  {
                     name: "GLSA-200411-05",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml",
                  },
                  {
                     name: "CLA-2004:890",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890",
                  },
                  {
                     name: "11324",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/11324",
                  },
                  {
                     name: "SUSE-SR:2005:001",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:1173",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173",
                  },
                  {
                     name: "USN-89-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-89-1/",
                  },
                  {
                     name: "13000",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/13000",
                  },
                  {
                     name: "DSA-582",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-582",
                  },
                  {
                     name: "libxml2-xmlnanoftpscanurl-bo(17870)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870",
                  },
                  {
                     name: "libxml2-xmlnanoftpscanproxy-bo(17875)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875",
                  },
                  {
                     name: "11180",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/11180",
                  },
                  {
                     name: "libxml2-nanohttp-file-bo(17876)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0989",
      datePublished: "2004-10-28T04:00:00",
      dateReserved: "2004-10-27T00:00:00",
      dateUpdated: "2024-08-08T00:38:59.682Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2008-5103 (GCVE-0-2008-5103)
Vulnerability from cvelistv5
Published
2008-11-17 18:00
Modified
2024-08-07 10:40
Severity ?
Summary
The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T10:40:17.156Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "32697",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/32697",
               },
               {
                  name: "32292",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/32292",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
               },
               {
                  name: "USN-670-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-670-1",
               },
               {
                  name: "vmbuilder-password-weak-security(46603)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
               },
               {
                  name: "49996",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/49996",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2008-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-07T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "32697",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/32697",
            },
            {
               name: "32292",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/32292",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
            },
            {
               name: "USN-670-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-670-1",
            },
            {
               name: "vmbuilder-password-weak-security(46603)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
            },
            {
               name: "49996",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/49996",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2008-5103",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "32697",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/32697",
                  },
                  {
                     name: "32292",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/32292",
                  },
                  {
                     name: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
                     refsource: "CONFIRM",
                     url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
                  },
                  {
                     name: "USN-670-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-670-1",
                  },
                  {
                     name: "vmbuilder-password-weak-security(46603)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603",
                  },
                  {
                     name: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
                     refsource: "CONFIRM",
                     url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
                  },
                  {
                     name: "49996",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/49996",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2008-5103",
      datePublished: "2008-11-17T18:00:00",
      dateReserved: "2008-11-17T00:00:00",
      dateUpdated: "2024-08-07T10:40:17.156Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-5877 (GCVE-0-2006-5877)
Vulnerability from cvelistv5
Published
2007-02-23 21:00
Modified
2024-08-07 20:04
Severity ?
Summary
The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.
References
http://bugzilla.mozdev.org/show_bug.cgi?id=9730x_refsource_CONFIRM
http://www.securityfocus.com/bid/22684vdb-entry, x_refsource_BID
http://enigmail.mozdev.org/changelog.html#enig0.94.2x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-427-1vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T20:04:55.595Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730",
               },
               {
                  name: "22684",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/22684",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2",
               },
               {
                  name: "USN-427-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-427-1",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-03-31T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2008-11-15T10:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730",
            },
            {
               name: "22684",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/22684",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2",
            },
            {
               name: "USN-427-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-427-1",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-5877",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730",
                     refsource: "CONFIRM",
                     url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730",
                  },
                  {
                     name: "22684",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/22684",
                  },
                  {
                     name: "http://enigmail.mozdev.org/changelog.html#enig0.94.2",
                     refsource: "CONFIRM",
                     url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2",
                  },
                  {
                     name: "USN-427-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-427-1",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-5877",
      datePublished: "2007-02-23T21:00:00",
      dateReserved: "2006-11-14T00:00:00",
      dateUpdated: "2024-08-07T20:04:55.595Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1012 (GCVE-0-2004-1012)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.882Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "DSA-597",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-597",
               },
               {
                  name: "cyrus-imap-commands-execute-code(18199)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/152004.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
               },
               {
                  name: "MDKSA-2004:139",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
               },
               {
                  name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
               },
               {
                  name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
               },
               {
                  name: "13274",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/13274/",
               },
               {
                  name: "GLSA-200411-34",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
               },
               {
                  name: "USN-31-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-31-1/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command (\"body[p\") that is treated as a different command (\"body.peek\") and causes an index increment error that leads to an out-of-bounds memory corruption.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "DSA-597",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-597",
            },
            {
               name: "cyrus-imap-commands-execute-code(18199)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/152004.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
            },
            {
               name: "MDKSA-2004:139",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
            },
            {
               name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
            },
            {
               name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
            },
            {
               name: "13274",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/13274/",
            },
            {
               name: "GLSA-200411-34",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
            },
            {
               name: "USN-31-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-31-1/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1012",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command (\"body[p\") that is treated as a different command (\"body.peek\") and causes an index increment error that leads to an out-of-bounds memory corruption.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "DSA-597",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-597",
                  },
                  {
                     name: "cyrus-imap-commands-execute-code(18199)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199",
                  },
                  {
                     name: "http://security.e-matters.de/advisories/152004.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/152004.html",
                  },
                  {
                     name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                     refsource: "CONFIRM",
                     url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                  },
                  {
                     name: "MDKSA-2004:139",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
                  },
                  {
                     name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
                  },
                  {
                     name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
                     refsource: "MLIST",
                     url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
                  },
                  {
                     name: "13274",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/13274/",
                  },
                  {
                     name: "GLSA-200411-34",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
                  },
                  {
                     name: "USN-31-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-31-1/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1012",
      datePublished: "2004-12-01T05:00:00",
      dateReserved: "2004-11-04T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.882Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1056 (GCVE-0-2004-1056)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.
References
https://bugzilla.fedora.us/show_bug.cgi?id=2336vendor-advisory, x_refsource_FEDORA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795vdb-entry, signature, x_refsource_OVAL
https://www.ubuntu.com/usn/usn-38-1/vendor-advisory, x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/15972vdb-entry, x_refsource_XF
http://www.redhat.com/support/errata/RHSA-2005-092.htmlvendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2005-551.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/17002third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2005-529.htmlvendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2005-663.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2005/1878vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.715Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FLSA:2336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
               },
               {
                  name: "oval:org.mitre.oval:def:9795",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795",
               },
               {
                  name: "USN-38-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-38-1/",
               },
               {
                  name: "linux-i810-dma-dos(15972)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972",
               },
               {
                  name: "RHSA-2005:092",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
               },
               {
                  name: "RHSA-2005:551",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-551.html",
               },
               {
                  name: "17002",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/17002",
               },
               {
                  name: "RHSA-2005:529",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-529.html",
               },
               {
                  name: "RHSA-2005:663",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-663.html",
               },
               {
                  name: "ADV-2005-1878",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2005/1878",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FLSA:2336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
            },
            {
               name: "oval:org.mitre.oval:def:9795",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795",
            },
            {
               name: "USN-38-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-38-1/",
            },
            {
               name: "linux-i810-dma-dos(15972)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972",
            },
            {
               name: "RHSA-2005:092",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
            },
            {
               name: "RHSA-2005:551",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-551.html",
            },
            {
               name: "17002",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/17002",
            },
            {
               name: "RHSA-2005:529",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-529.html",
            },
            {
               name: "RHSA-2005:663",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-663.html",
            },
            {
               name: "ADV-2005-1878",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2005/1878",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1056",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FLSA:2336",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9795",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795",
                  },
                  {
                     name: "USN-38-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-38-1/",
                  },
                  {
                     name: "linux-i810-dma-dos(15972)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972",
                  },
                  {
                     name: "RHSA-2005:092",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
                  },
                  {
                     name: "RHSA-2005:551",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-551.html",
                  },
                  {
                     name: "17002",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/17002",
                  },
                  {
                     name: "RHSA-2005:529",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-529.html",
                  },
                  {
                     name: "RHSA-2005:663",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-663.html",
                  },
                  {
                     name: "ADV-2005-1878",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2005/1878",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1056",
      datePublished: "2004-12-22T05:00:00",
      dateReserved: "2004-11-23T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.715Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-4601 (GCVE-0-2007-4601)
Vulnerability from cvelistv5
Published
2007-08-30 22:00
Modified
2024-08-07 15:01
Severity ?
Summary
A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/36364vdb-entry, x_refsource_XF
http://secunia.com/advisories/26567third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/40140vdb-entry, x_refsource_OSVDB
http://bugs.debian.org/405342x_refsource_MISC
https://launchpad.net/bugs/135332x_refsource_MISC
http://www.ubuntu.com/usn/usn-507-1vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T15:01:09.683Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ubuntu-tcpwrapper-security-bypass(36364)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364",
               },
               {
                  name: "26567",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26567",
               },
               {
                  name: "40140",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/40140",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://bugs.debian.org/405342",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.net/bugs/135332",
               },
               {
                  name: "USN-507-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-507-1",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-08-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-28T12:57:01",
            orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
            shortName: "canonical",
         },
         references: [
            {
               name: "ubuntu-tcpwrapper-security-bypass(36364)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364",
            },
            {
               name: "26567",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26567",
            },
            {
               name: "40140",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/40140",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://bugs.debian.org/405342",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.net/bugs/135332",
            },
            {
               name: "USN-507-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-507-1",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@ubuntu.com",
               ID: "CVE-2007-4601",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "ubuntu-tcpwrapper-security-bypass(36364)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364",
                  },
                  {
                     name: "26567",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26567",
                  },
                  {
                     name: "40140",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/40140",
                  },
                  {
                     name: "http://bugs.debian.org/405342",
                     refsource: "MISC",
                     url: "http://bugs.debian.org/405342",
                  },
                  {
                     name: "https://launchpad.net/bugs/135332",
                     refsource: "MISC",
                     url: "https://launchpad.net/bugs/135332",
                  },
                  {
                     name: "USN-507-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-507-1",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
      assignerShortName: "canonical",
      cveId: "CVE-2007-4601",
      datePublished: "2007-08-30T22:00:00",
      dateReserved: "2007-08-30T00:00:00",
      dateUpdated: "2024-08-07T15:01:09.683Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1067 (GCVE-0-2004-1067)
Vulnerability from cvelistv5
Published
2004-12-10 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.545Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "cyrus-mysaslcanonuser-offbyone-bo(18333)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
               },
               {
                  name: "11738",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11738",
               },
               {
                  name: "USN-37-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-37-1/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-02T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "cyrus-mysaslcanonuser-offbyone-bo(18333)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
            },
            {
               name: "11738",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11738",
            },
            {
               name: "USN-37-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-37-1/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1067",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "cyrus-mysaslcanonuser-offbyone-bo(18333)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333",
                  },
                  {
                     name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                     refsource: "CONFIRM",
                     url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                  },
                  {
                     name: "11738",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11738",
                  },
                  {
                     name: "USN-37-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-37-1/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1067",
      datePublished: "2004-12-10T05:00:00",
      dateReserved: "2004-11-29T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.545Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0949 (GCVE-0-2004-0949)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:31
Severity ?
Summary
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
References
http://secunia.com/advisories/20163third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/11695vdb-entry, x_refsource_BID
http://www.debian.org/security/2006/dsa-1082vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022vendor-advisory, x_refsource_MANDRAKE
http://marc.info/?l=bugtraq&m=110072140811965&w=2mailing-list, x_refsource_BUGTRAQ
https://bugzilla.fedora.us/show_bug.cgi?id=2336vendor-advisory, x_refsource_FEDORA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360vdb-entry, signature, x_refsource_OVAL
https://www.ubuntu.com/usn/usn-30-1/vendor-advisory, x_refsource_UBUNTU
http://security.e-matters.de/advisories/142004.htmlx_refsource_MISC
http://www.debian.org/security/2006/dsa-1070vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2004-537.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/20162third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/18137vdb-entry, x_refsource_XF
http://www.debian.org/security/2006/dsa-1067vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2006/dsa-1069vendor-advisory, x_refsource_DEBIAN
http://www.trustix.org/errata/2004/0061/vendor-advisory, x_refsource_TRUSTIX
http://www.redhat.com/support/errata/RHSA-2004-505.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/20202third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2004-504.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/13232/third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20338third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:48.211Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20163",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20163",
               },
               {
                  name: "11695",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11695",
               },
               {
                  name: "DSA-1082",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1082",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
               },
               {
                  name: "FLSA:2336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
               },
               {
                  name: "oval:org.mitre.oval:def:10360",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360",
               },
               {
                  name: "USN-30-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-30-1/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/142004.html",
               },
               {
                  name: "DSA-1070",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1070",
               },
               {
                  name: "RHSA-2004:537",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
               },
               {
                  name: "20162",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20162",
               },
               {
                  name: "linux-smbrecvtrans2-memory-leak(18137)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137",
               },
               {
                  name: "DSA-1067",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1067",
               },
               {
                  name: "DSA-1069",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1069",
               },
               {
                  name: "2004-0061",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2004/0061/",
               },
               {
                  name: "RHSA-2004:505",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
               },
               {
                  name: "20202",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20202",
               },
               {
                  name: "RHSA-2004:504",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
               },
               {
                  name: "13232",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/13232/",
               },
               {
                  name: "20338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20338",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20163",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20163",
            },
            {
               name: "11695",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11695",
            },
            {
               name: "DSA-1082",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1082",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
            },
            {
               name: "FLSA:2336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
            },
            {
               name: "oval:org.mitre.oval:def:10360",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360",
            },
            {
               name: "USN-30-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-30-1/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/142004.html",
            },
            {
               name: "DSA-1070",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1070",
            },
            {
               name: "RHSA-2004:537",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
            },
            {
               name: "20162",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20162",
            },
            {
               name: "linux-smbrecvtrans2-memory-leak(18137)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137",
            },
            {
               name: "DSA-1067",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1067",
            },
            {
               name: "DSA-1069",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1069",
            },
            {
               name: "2004-0061",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2004/0061/",
            },
            {
               name: "RHSA-2004:505",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
            },
            {
               name: "20202",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20202",
            },
            {
               name: "RHSA-2004:504",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
            },
            {
               name: "13232",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/13232/",
            },
            {
               name: "20338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20338",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0949",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20163",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20163",
                  },
                  {
                     name: "11695",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11695",
                  },
                  {
                     name: "DSA-1082",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1082",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
                  },
                  {
                     name: "FLSA:2336",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10360",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360",
                  },
                  {
                     name: "USN-30-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-30-1/",
                  },
                  {
                     name: "http://security.e-matters.de/advisories/142004.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/142004.html",
                  },
                  {
                     name: "DSA-1070",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1070",
                  },
                  {
                     name: "RHSA-2004:537",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
                  },
                  {
                     name: "20162",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20162",
                  },
                  {
                     name: "linux-smbrecvtrans2-memory-leak(18137)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137",
                  },
                  {
                     name: "DSA-1067",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1067",
                  },
                  {
                     name: "DSA-1069",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1069",
                  },
                  {
                     name: "2004-0061",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2004/0061/",
                  },
                  {
                     name: "RHSA-2004:505",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
                  },
                  {
                     name: "20202",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20202",
                  },
                  {
                     name: "RHSA-2004:504",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
                  },
                  {
                     name: "13232",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/13232/",
                  },
                  {
                     name: "20338",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20338",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0949",
      datePublished: "2004-12-01T05:00:00",
      dateReserved: "2004-10-12T00:00:00",
      dateUpdated: "2024-08-08T00:31:48.211Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0827 (GCVE-0-2004-0827)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.850Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "oval:org.mitre.oval:def:11123",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123",
               },
               {
                  name: "ADV-2008-0412",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/0412",
               },
               {
                  name: "201006",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1",
               },
               {
                  name: "DSA-547",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-547",
               },
               {
                  name: "RHSA-2004:494",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-494.html",
               },
               {
                  name: "RHSA-2004:480",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-480.html",
               },
               {
                  name: "231321",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1",
               },
               {
                  name: "imagemagick-bmp-Bo(17173)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173",
               },
               {
                  name: "28800",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28800",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-09-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "oval:org.mitre.oval:def:11123",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123",
            },
            {
               name: "ADV-2008-0412",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/0412",
            },
            {
               name: "201006",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1",
            },
            {
               name: "DSA-547",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-547",
            },
            {
               name: "RHSA-2004:494",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-494.html",
            },
            {
               name: "RHSA-2004:480",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-480.html",
            },
            {
               name: "231321",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1",
            },
            {
               name: "imagemagick-bmp-Bo(17173)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173",
            },
            {
               name: "28800",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28800",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0827",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "oval:org.mitre.oval:def:11123",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123",
                  },
                  {
                     name: "ADV-2008-0412",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/0412",
                  },
                  {
                     name: "201006",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1",
                  },
                  {
                     name: "DSA-547",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-547",
                  },
                  {
                     name: "RHSA-2004:494",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-494.html",
                  },
                  {
                     name: "RHSA-2004:480",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-480.html",
                  },
                  {
                     name: "231321",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1",
                  },
                  {
                     name: "imagemagick-bmp-Bo(17173)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173",
                  },
                  {
                     name: "28800",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28800",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0827",
      datePublished: "2004-09-24T04:00:00",
      dateReserved: "2004-09-02T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.850Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1068 (GCVE-0-2004-1068)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
References
http://secunia.com/advisories/20163third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1082vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022vendor-advisory, x_refsource_MANDRAKE
http://marc.info/?l=bugtraq&m=110306397320336&w=2mailing-list, x_refsource_BUGTRAQ
https://bugzilla.fedora.us/show_bug.cgi?id=2336vendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/11715vdb-entry, x_refsource_BID
http://www.novell.com/linux/security/advisories/2004_44_kernel.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/19607third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1070vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2004-537.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/20162third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/381689mailing-list, x_refsource_BUGTRAQ
http://www.debian.org/security/2006/dsa-1067vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2006/dsa-1069vendor-advisory, x_refsource_DEBIAN
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-Uvendor-advisory, x_refsource_SGI
http://www.redhat.com/support/errata/RHSA-2004-505.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/20202third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384vdb-entry, signature, x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2004-504.htmlvendor-advisory, x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/18230vdb-entry, x_refsource_XF
http://secunia.com/advisories/20338third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.709Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20163",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20163",
               },
               {
                  name: "DSA-1082",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1082",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
               },
               {
                  name: "FLSA:2336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
               },
               {
                  name: "11715",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11715",
               },
               {
                  name: "SUSE-SA:2004:044",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
               },
               {
                  name: "19607",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19607",
               },
               {
                  name: "DSA-1070",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1070",
               },
               {
                  name: "RHSA-2004:537",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
               },
               {
                  name: "20162",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20162",
               },
               {
                  name: "20041119 Addendum, recent Linux <= 2.4.27 vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/381689",
               },
               {
                  name: "DSA-1067",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1067",
               },
               {
                  name: "DSA-1069",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1069",
               },
               {
                  name: "20060402-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
               },
               {
                  name: "RHSA-2004:505",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
               },
               {
                  name: "20202",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20202",
               },
               {
                  name: "oval:org.mitre.oval:def:11384",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384",
               },
               {
                  name: "RHSA-2004:504",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
               },
               {
                  name: "linux-afunix-race-condition(18230)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230",
               },
               {
                  name: "20338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20338",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20163",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20163",
            },
            {
               name: "DSA-1082",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1082",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
            },
            {
               name: "FLSA:2336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
            },
            {
               name: "11715",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11715",
            },
            {
               name: "SUSE-SA:2004:044",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
            },
            {
               name: "19607",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19607",
            },
            {
               name: "DSA-1070",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1070",
            },
            {
               name: "RHSA-2004:537",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
            },
            {
               name: "20162",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20162",
            },
            {
               name: "20041119 Addendum, recent Linux <= 2.4.27 vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/381689",
            },
            {
               name: "DSA-1067",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1067",
            },
            {
               name: "DSA-1069",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1069",
            },
            {
               name: "20060402-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
            },
            {
               name: "RHSA-2004:505",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
            },
            {
               name: "20202",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20202",
            },
            {
               name: "oval:org.mitre.oval:def:11384",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384",
            },
            {
               name: "RHSA-2004:504",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
            },
            {
               name: "linux-afunix-race-condition(18230)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230",
            },
            {
               name: "20338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20338",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1068",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20163",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20163",
                  },
                  {
                     name: "DSA-1082",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1082",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
                  },
                  {
                     name: "FLSA:2336",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
                  },
                  {
                     name: "11715",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11715",
                  },
                  {
                     name: "SUSE-SA:2004:044",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
                  },
                  {
                     name: "19607",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19607",
                  },
                  {
                     name: "DSA-1070",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1070",
                  },
                  {
                     name: "RHSA-2004:537",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
                  },
                  {
                     name: "20162",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20162",
                  },
                  {
                     name: "20041119 Addendum, recent Linux <= 2.4.27 vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/381689",
                  },
                  {
                     name: "DSA-1067",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1067",
                  },
                  {
                     name: "DSA-1069",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1069",
                  },
                  {
                     name: "20060402-01-U",
                     refsource: "SGI",
                     url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
                  },
                  {
                     name: "RHSA-2004:505",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
                  },
                  {
                     name: "20202",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20202",
                  },
                  {
                     name: "oval:org.mitre.oval:def:11384",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384",
                  },
                  {
                     name: "RHSA-2004:504",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
                  },
                  {
                     name: "linux-afunix-race-condition(18230)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230",
                  },
                  {
                     name: "20338",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20338",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1068",
      datePublished: "2004-12-01T05:00:00",
      dateReserved: "2004-11-29T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.709Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-3920 (GCVE-0-2007-3920)
Vulnerability from cvelistv5
Published
2007-10-29 21:00
Modified
2024-08-07 14:37
Severity ?
Summary
GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T14:37:05.347Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061",
               },
               {
                  name: "oval:org.mitre.oval:def:10192",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192",
               },
               {
                  name: "FEDORA-2008-0956",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html",
               },
               {
                  name: "USN-537-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-537-2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071",
               },
               {
                  name: "30715",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30715",
               },
               {
                  name: "gnomescreensaver-compiz-security-bypass(37410)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410",
               },
               {
                  name: "SUSE-SA:2008:027",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html",
               },
               {
                  name: "USN-537-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-537-1",
               },
               {
                  name: "FEDORA-2008-0930",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html",
               },
               {
                  name: "26188",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/26188",
               },
               {
                  name: "RHSA-2008:0485",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html",
               },
               {
                  name: "27381",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27381",
               },
               {
                  name: "28627",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28627",
               },
               {
                  name: "30329",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30329",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-10-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061",
            },
            {
               name: "oval:org.mitre.oval:def:10192",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192",
            },
            {
               name: "FEDORA-2008-0956",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html",
            },
            {
               name: "USN-537-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-537-2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071",
            },
            {
               name: "30715",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30715",
            },
            {
               name: "gnomescreensaver-compiz-security-bypass(37410)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410",
            },
            {
               name: "SUSE-SA:2008:027",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html",
            },
            {
               name: "USN-537-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-537-1",
            },
            {
               name: "FEDORA-2008-0930",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html",
            },
            {
               name: "26188",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/26188",
            },
            {
               name: "RHSA-2008:0485",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html",
            },
            {
               name: "27381",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27381",
            },
            {
               name: "28627",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28627",
            },
            {
               name: "30329",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30329",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-3920",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=363061",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10192",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192",
                  },
                  {
                     name: "FEDORA-2008-0956",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html",
                  },
                  {
                     name: "USN-537-2",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-537-2",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=357071",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071",
                  },
                  {
                     name: "30715",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30715",
                  },
                  {
                     name: "gnomescreensaver-compiz-security-bypass(37410)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410",
                  },
                  {
                     name: "SUSE-SA:2008:027",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html",
                  },
                  {
                     name: "USN-537-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-537-1",
                  },
                  {
                     name: "FEDORA-2008-0930",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html",
                  },
                  {
                     name: "26188",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/26188",
                  },
                  {
                     name: "RHSA-2008:0485",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html",
                  },
                  {
                     name: "27381",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/27381",
                  },
                  {
                     name: "28627",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28627",
                  },
                  {
                     name: "30329",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30329",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-3920",
      datePublished: "2007-10-29T21:00:00",
      dateReserved: "2007-07-20T00:00:00",
      dateUpdated: "2024-08-07T14:37:05.347Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0109 (GCVE-0-2005-0109)
Vulnerability from cvelistv5
Published
2005-03-08 05:00
Modified
2024-08-07 20:57
Severity ?
Summary
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
References
http://www.kb.cert.org/vuls/id/911878third-party-advisory, x_refsource_CERT-VN
http://secunia.com/advisories/18165third-party-advisory, x_refsource_SECUNIA
http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754x_refsource_MISC
http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2mailing-list, x_refsource_MLIST
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txtvendor-advisory, x_refsource_SCO
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747vdb-entry, signature, x_refsource_OVAL
http://www.vupen.com/english/advisories/2005/3002vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/15348third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/12724vdb-entry, x_refsource_BID
http://marc.info/?l=freebsd-security&m=110994370429609&w=2mailing-list, x_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2005-476.htmlvendor-advisory, x_refsource_REDHAT
http://securitytracker.com/id?1013967vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2005/0540vdb-entry, x_refsource_VUPEN
http://www.daemonology.net/papers/htt.pdfx_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2005-800.htmlvendor-advisory, x_refsource_REDHAT
http://www.daemonology.net/hyperthreading-considered-harmful/x_refsource_MISC
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1vendor-advisory, x_refsource_SUNALERT
http://marc.info/?l=openbsd-misc&m=110995101417256&w=2mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T20:57:41.235Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "VU#911878",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/911878",
               },
               {
                  name: "18165",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18165",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754",
               },
               {
                  name: "[freebsd-hackers] 20050304 Re: FW:FreeBSD hiding security stuff",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2",
               },
               {
                  name: "SCOSA-2005.24",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt",
               },
               {
                  name: "oval:org.mitre.oval:def:9747",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747",
               },
               {
                  name: "ADV-2005-3002",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2005/3002",
               },
               {
                  name: "15348",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/15348",
               },
               {
                  name: "12724",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/12724",
               },
               {
                  name: "[freebsd-security] 20050304 [Fwd: Re: FW:FreeBSD hiding security stuff]",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2",
               },
               {
                  name: "RHSA-2005:476",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-476.html",
               },
               {
                  name: "1013967",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1013967",
               },
               {
                  name: "ADV-2005-0540",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2005/0540",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.daemonology.net/papers/htt.pdf",
               },
               {
                  name: "RHSA-2005:800",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-800.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.daemonology.net/hyperthreading-considered-harmful/",
               },
               {
                  name: "101739",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1",
               },
               {
                  name: "[openbsd-misc] 20050304 Re: FreeBSD hiding security stuff",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-03-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "VU#911878",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/911878",
            },
            {
               name: "18165",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18165",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754",
            },
            {
               name: "[freebsd-hackers] 20050304 Re: FW:FreeBSD hiding security stuff",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2",
            },
            {
               name: "SCOSA-2005.24",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt",
            },
            {
               name: "oval:org.mitre.oval:def:9747",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747",
            },
            {
               name: "ADV-2005-3002",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2005/3002",
            },
            {
               name: "15348",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/15348",
            },
            {
               name: "12724",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/12724",
            },
            {
               name: "[freebsd-security] 20050304 [Fwd: Re: FW:FreeBSD hiding security stuff]",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2",
            },
            {
               name: "RHSA-2005:476",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-476.html",
            },
            {
               name: "1013967",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1013967",
            },
            {
               name: "ADV-2005-0540",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2005/0540",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.daemonology.net/papers/htt.pdf",
            },
            {
               name: "RHSA-2005:800",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-800.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.daemonology.net/hyperthreading-considered-harmful/",
            },
            {
               name: "101739",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1",
            },
            {
               name: "[openbsd-misc] 20050304 Re: FreeBSD hiding security stuff",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-0109",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "VU#911878",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/911878",
                  },
                  {
                     name: "18165",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18165",
                  },
                  {
                     name: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754",
                     refsource: "MISC",
                     url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754",
                  },
                  {
                     name: "[freebsd-hackers] 20050304 Re: FW:FreeBSD hiding security stuff",
                     refsource: "MLIST",
                     url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2",
                  },
                  {
                     name: "SCOSA-2005.24",
                     refsource: "SCO",
                     url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9747",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747",
                  },
                  {
                     name: "ADV-2005-3002",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2005/3002",
                  },
                  {
                     name: "15348",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/15348",
                  },
                  {
                     name: "12724",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/12724",
                  },
                  {
                     name: "[freebsd-security] 20050304 [Fwd: Re: FW:FreeBSD hiding security stuff]",
                     refsource: "MLIST",
                     url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2",
                  },
                  {
                     name: "RHSA-2005:476",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-476.html",
                  },
                  {
                     name: "1013967",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1013967",
                  },
                  {
                     name: "ADV-2005-0540",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2005/0540",
                  },
                  {
                     name: "http://www.daemonology.net/papers/htt.pdf",
                     refsource: "MISC",
                     url: "http://www.daemonology.net/papers/htt.pdf",
                  },
                  {
                     name: "RHSA-2005:800",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-800.html",
                  },
                  {
                     name: "http://www.daemonology.net/hyperthreading-considered-harmful/",
                     refsource: "MISC",
                     url: "http://www.daemonology.net/hyperthreading-considered-harmful/",
                  },
                  {
                     name: "101739",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1",
                  },
                  {
                     name: "[openbsd-misc] 20050304 Re: FreeBSD hiding security stuff",
                     refsource: "MLIST",
                     url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-0109",
      datePublished: "2005-03-08T05:00:00",
      dateReserved: "2005-01-18T00:00:00",
      dateUpdated: "2024-08-07T20:57:41.235Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1016 (GCVE-0-2004-1016)
Vulnerability from cvelistv5
Published
2004-12-15 05:00
Modified
2024-08-08 00:38
Severity ?
Summary
The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.
References
http://secunia.com/advisories/20163third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/18483vdb-entry, x_refsource_XF
http://www.debian.org/security/2006/dsa-1082vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022vendor-advisory, x_refsource_MANDRAKE
http://www.redhat.com/support/errata/RHSA-2005-017.htmlvendor-advisory, x_refsource_REDHAT
https://bugzilla.fedora.us/show_bug.cgi?id=2336vendor-advisory, x_refsource_FEDORA
https://www.ubuntu.com/usn/usn-38-1/vendor-advisory, x_refsource_UBUNTU
http://www.novell.com/linux/security/advisories/2004_44_kernel.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2006/dsa-1070vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2004-689.htmlvendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2005-016.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/20162third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/11921vdb-entry, x_refsource_BID
http://www.debian.org/security/2006/dsa-1067vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2006/dsa-1069vendor-advisory, x_refsource_DEBIAN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/20202third-party-advisory, x_refsource_SECUNIA
http://isec.pl/vulnerabilities/isec-0019-scm.txtx_refsource_MISC
http://secunia.com/advisories/20338third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:38:59.670Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20163",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20163",
               },
               {
                  name: "linux-scmsend-dos(18483)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483",
               },
               {
                  name: "DSA-1082",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1082",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "RHSA-2005:017",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
               },
               {
                  name: "FLSA:2336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
               },
               {
                  name: "USN-38-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-38-1/",
               },
               {
                  name: "SUSE-SA:2004:044",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
               },
               {
                  name: "DSA-1070",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1070",
               },
               {
                  name: "RHSA-2004:689",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-689.html",
               },
               {
                  name: "RHSA-2005:016",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
               },
               {
                  name: "20162",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20162",
               },
               {
                  name: "11921",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11921",
               },
               {
                  name: "DSA-1067",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1067",
               },
               {
                  name: "DSA-1069",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1069",
               },
               {
                  name: "oval:org.mitre.oval:def:11816",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816",
               },
               {
                  name: "20202",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20202",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt",
               },
               {
                  name: "20338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20338",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20163",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20163",
            },
            {
               name: "linux-scmsend-dos(18483)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483",
            },
            {
               name: "DSA-1082",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1082",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "RHSA-2005:017",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
            },
            {
               name: "FLSA:2336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
            },
            {
               name: "USN-38-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-38-1/",
            },
            {
               name: "SUSE-SA:2004:044",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
            },
            {
               name: "DSA-1070",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1070",
            },
            {
               name: "RHSA-2004:689",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-689.html",
            },
            {
               name: "RHSA-2005:016",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
            },
            {
               name: "20162",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20162",
            },
            {
               name: "11921",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11921",
            },
            {
               name: "DSA-1067",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1067",
            },
            {
               name: "DSA-1069",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1069",
            },
            {
               name: "oval:org.mitre.oval:def:11816",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816",
            },
            {
               name: "20202",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20202",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt",
            },
            {
               name: "20338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20338",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1016",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20163",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20163",
                  },
                  {
                     name: "linux-scmsend-dos(18483)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483",
                  },
                  {
                     name: "DSA-1082",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1082",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "RHSA-2005:017",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
                  },
                  {
                     name: "FLSA:2336",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
                  },
                  {
                     name: "USN-38-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-38-1/",
                  },
                  {
                     name: "SUSE-SA:2004:044",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
                  },
                  {
                     name: "DSA-1070",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1070",
                  },
                  {
                     name: "RHSA-2004:689",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-689.html",
                  },
                  {
                     name: "RHSA-2005:016",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
                  },
                  {
                     name: "20162",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20162",
                  },
                  {
                     name: "11921",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11921",
                  },
                  {
                     name: "DSA-1067",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1067",
                  },
                  {
                     name: "DSA-1069",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1069",
                  },
                  {
                     name: "oval:org.mitre.oval:def:11816",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816",
                  },
                  {
                     name: "20202",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20202",
                  },
                  {
                     name: "http://isec.pl/vulnerabilities/isec-0019-scm.txt",
                     refsource: "MISC",
                     url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt",
                  },
                  {
                     name: "20338",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20338",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1016",
      datePublished: "2004-12-15T05:00:00",
      dateReserved: "2004-11-04T00:00:00",
      dateUpdated: "2024-08-08T00:38:59.670Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0966 (GCVE-0-2004-0966)
Vulnerability from cvelistv5
Published
2004-10-20 04:00
Modified
2024-08-08 00:38
Severity ?
Summary
The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:38:59.470Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FLSA:136323",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html",
               },
               {
                  name: "OpenPKG-SA-2004.055",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENPKG",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2",
               },
               {
                  name: "GLSA-200410-10",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml",
               },
               {
                  name: "script-temporary-file-overwrite(17583)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
               },
               {
                  name: "11282",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11282",
               },
               {
                  name: "2004-0050",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2004/0050",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323",
               },
               {
                  name: "USN-5-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-5-1/",
               },
               {
                  name: "MDKSA-2006:051",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-09-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FLSA:136323",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html",
            },
            {
               name: "OpenPKG-SA-2004.055",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENPKG",
               ],
               url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2",
            },
            {
               name: "GLSA-200410-10",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml",
            },
            {
               name: "script-temporary-file-overwrite(17583)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
            },
            {
               name: "11282",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11282",
            },
            {
               name: "2004-0050",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2004/0050",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323",
            },
            {
               name: "USN-5-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-5-1/",
            },
            {
               name: "MDKSA-2006:051",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0966",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FLSA:136323",
                     refsource: "FEDORA",
                     url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html",
                  },
                  {
                     name: "OpenPKG-SA-2004.055",
                     refsource: "OPENPKG",
                     url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2",
                  },
                  {
                     name: "GLSA-200410-10",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml",
                  },
                  {
                     name: "script-temporary-file-overwrite(17583)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
                  },
                  {
                     name: "11282",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11282",
                  },
                  {
                     name: "2004-0050",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2004/0050",
                  },
                  {
                     name: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323",
                     refsource: "CONFIRM",
                     url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323",
                  },
                  {
                     name: "USN-5-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-5-1/",
                  },
                  {
                     name: "MDKSA-2006:051",
                     refsource: "MANDRIVA",
                     url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0966",
      datePublished: "2004-10-20T04:00:00",
      dateReserved: "2004-10-19T00:00:00",
      dateUpdated: "2024-08-08T00:38:59.470Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-5466 (GCVE-0-2006-5466)
Vulnerability from cvelistv5
Published
2006-11-06 17:00
Modified
2024-08-07 19:48
Severity ?
Summary
Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.
References
http://security.gentoo.org/glsa/glsa-200611-08.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/22740third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/22854third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-378-1vendor-advisory, x_refsource_UBUNTU
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833x_refsource_MISC
http://securitytracker.com/id?1017160vdb-entry, x_refsource_SECTRACK
http://www.mandriva.com/security/advisories?name=MDKSA-2006:200vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/20906vdb-entry, x_refsource_BID
http://secunia.com/advisories/22745third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/22768third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4350vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T19:48:30.563Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-200611-08",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200611-08.xml",
               },
               {
                  name: "22740",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/22740",
               },
               {
                  name: "22854",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/22854",
               },
               {
                  name: "USN-378-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-378-1",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833",
               },
               {
                  name: "1017160",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1017160",
               },
               {
                  name: "MDKSA-2006:200",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:200",
               },
               {
                  name: "20906",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/20906",
               },
               {
                  name: "22745",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/22745",
               },
               {
                  name: "22768",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/22768",
               },
               {
                  name: "ADV-2006-4350",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/4350",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-11-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2006-11-15T10:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "GLSA-200611-08",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200611-08.xml",
            },
            {
               name: "22740",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/22740",
            },
            {
               name: "22854",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/22854",
            },
            {
               name: "USN-378-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-378-1",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833",
            },
            {
               name: "1017160",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1017160",
            },
            {
               name: "MDKSA-2006:200",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:200",
            },
            {
               name: "20906",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/20906",
            },
            {
               name: "22745",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/22745",
            },
            {
               name: "22768",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/22768",
            },
            {
               name: "ADV-2006-4350",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/4350",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2006-5466",
      datePublished: "2006-11-06T17:00:00",
      dateReserved: "2006-10-23T00:00:00",
      dateUpdated: "2024-08-07T19:48:30.563Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-1999-1572 (GCVE-0-1999-1572)
Vulnerability from cvelistv5
Published
2005-01-29 05:00
Modified
2024-08-01 17:18
Severity ?
Summary
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
References
http://marc.info/?l=bugtraq&m=110763404701519&w=2mailing-list, x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2005-073.htmlvendor-advisory, x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/19167vdb-entry, x_refsource_XF
http://secunia.com/advisories/17063third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17532third-party-advisory, x_refsource_SECUNIA
http://www.trustix.org/errata/2005/0003/vendor-advisory, x_refsource_TRUSTIX
http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdfx_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2005-080.htmlvendor-advisory, x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888vdb-entry, signature, x_refsource_OVAL
http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391x_refsource_MISC
http://secunia.com/advisories/14357third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2005:032vendor-advisory, x_refsource_MANDRAKE
http://www.debian.org/security/2005/dsa-664vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2005-806.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T17:18:07.480Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20050204 [USN-75-1] cpio vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2",
               },
               {
                  name: "RHSA-2005:073",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-073.html",
               },
               {
                  name: "cpio-o-archive-insecure-permissions(19167)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167",
               },
               {
                  name: "17063",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/17063",
               },
               {
                  name: "17532",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/17532",
               },
               {
                  name: "2005-0003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2005/0003/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
               },
               {
                  name: "RHSA-2005:080",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-080.html",
               },
               {
                  name: "oval:org.mitre.oval:def:10888",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
               },
               {
                  name: "14357",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/14357",
               },
               {
                  name: "MDKSA-2005:032",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032",
               },
               {
                  name: "DSA-664",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-664",
               },
               {
                  name: "RHSA-2005:806",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-806.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "1997-02-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-18T16:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20050204 [USN-75-1] cpio vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2",
            },
            {
               name: "RHSA-2005:073",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-073.html",
            },
            {
               name: "cpio-o-archive-insecure-permissions(19167)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167",
            },
            {
               name: "17063",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/17063",
            },
            {
               name: "17532",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/17532",
            },
            {
               name: "2005-0003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2005/0003/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
            },
            {
               name: "RHSA-2005:080",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-080.html",
            },
            {
               name: "oval:org.mitre.oval:def:10888",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
            },
            {
               name: "14357",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/14357",
            },
            {
               name: "MDKSA-2005:032",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032",
            },
            {
               name: "DSA-664",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-664",
            },
            {
               name: "RHSA-2005:806",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-806.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-1999-1572",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20050204 [USN-75-1] cpio vulnerability",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2",
                  },
                  {
                     name: "RHSA-2005:073",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-073.html",
                  },
                  {
                     name: "cpio-o-archive-insecure-permissions(19167)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167",
                  },
                  {
                     name: "17063",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/17063",
                  },
                  {
                     name: "17532",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/17532",
                  },
                  {
                     name: "2005-0003",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2005/0003/",
                  },
                  {
                     name: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
                  },
                  {
                     name: "RHSA-2005:080",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-080.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10888",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888",
                  },
                  {
                     name: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
                     refsource: "MISC",
                     url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
                  },
                  {
                     name: "14357",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/14357",
                  },
                  {
                     name: "MDKSA-2005:032",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032",
                  },
                  {
                     name: "DSA-664",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2005/dsa-664",
                  },
                  {
                     name: "RHSA-2005:806",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-806.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-1999-1572",
      datePublished: "2005-01-29T05:00:00",
      dateReserved: "2005-01-27T00:00:00",
      dateUpdated: "2024-08-01T17:18:07.480Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-5648 (GCVE-0-2006-5648)
Vulnerability from cvelistv5
Published
2006-12-14 00:00
Modified
2025-04-03 15:31
Summary
Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.
References
http://www.novell.com/linux/security/advisories/2006_79_kernel.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/23361third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/23384third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/21582vdb-entry, x_refsource_BID
http://secunia.com/advisories/23474third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-395-1vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T19:55:54.157Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "SUSE-SA:2006:079",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
               },
               {
                  name: "23361",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23361",
               },
               {
                  name: "23384",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23384",
               },
               {
                  name: "21582",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/21582",
               },
               {
                  name: "23474",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23474",
               },
               {
                  name: "USN-395-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-395-1",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 5.5,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2006-5648",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-03T15:29:54.817209Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-400",
                        description: "CWE-400 Uncontrolled Resource Consumption",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-03T15:31:11.902Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-12-13T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2006-12-28T10:00:00.000Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "SUSE-SA:2006:079",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
            },
            {
               name: "23361",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23361",
            },
            {
               name: "23384",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23384",
            },
            {
               name: "21582",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/21582",
            },
            {
               name: "23474",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23474",
            },
            {
               name: "USN-395-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-395-1",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-5648",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "SUSE-SA:2006:079",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
                  },
                  {
                     name: "23361",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23361",
                  },
                  {
                     name: "23384",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23384",
                  },
                  {
                     name: "21582",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/21582",
                  },
                  {
                     name: "23474",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23474",
                  },
                  {
                     name: "USN-395-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-395-1",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-5648",
      datePublished: "2006-12-14T00:00:00.000Z",
      dateReserved: "2006-11-01T00:00:00.000Z",
      dateUpdated: "2025-04-03T15:31:11.902Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0888 (GCVE-0-2004-0888)
Vulnerability from cvelistv5
Published
2004-10-26 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
References
http://www.redhat.com/support/errata/RHSA-2004-592.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/11501vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2005-066.htmlvendor-advisory, x_refsource_REDHAT
https://www.ubuntu.com/usn/usn-9-1/vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDKSA-2004:113vendor-advisory, x_refsource_MANDRAKE
http://www.gentoo.org/security/en/glsa/glsa-200410-20.xmlvendor-advisory, x_refsource_GENTOO
http://www.debian.org/security/2004/dsa-581vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2004/dsa-573vendor-advisory, x_refsource_DEBIAN
https://bugzilla.fedora.us/show_bug.cgi?id=2353vendor-advisory, x_refsource_FEDORA
http://www.mandriva.com/security/advisories?name=MDKSA-2004:116vendor-advisory, x_refsource_MANDRAKE
http://www.debian.org/security/2004/dsa-599vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/17818vdb-entry, x_refsource_XF
http://www.redhat.com/support/errata/RHSA-2005-354.htmlvendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2004-543.htmlvendor-advisory, x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714vdb-entry, signature, x_refsource_OVAL
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886vendor-advisory, x_refsource_CONECTIVA
http://www.mandriva.com/security/advisories?name=MDKSA-2004:114vendor-advisory, x_refsource_MANDRAKE
http://www.gentoo.org/security/en/glsa/glsa-200410-30.xmlvendor-advisory, x_refsource_GENTOO
http://www.mandriva.com/security/advisories?name=MDKSA-2004:115vendor-advisory, x_refsource_MANDRAKE
http://marc.info/?l=bugtraq&m=109880927526773&w=2vendor-advisory, x_refsource_SUSE
http://marc.info/?l=bugtraq&m=110815379627883&w=2vendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.615Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2004:592",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-592.html",
               },
               {
                  name: "11501",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11501",
               },
               {
                  name: "RHSA-2005:066",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-066.html",
               },
               {
                  name: "USN-9-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-9-1/",
               },
               {
                  name: "MDKSA-2004:113",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
               },
               {
                  name: "GLSA-200410-20",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
               },
               {
                  name: "DSA-581",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-581",
               },
               {
                  name: "DSA-573",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-573",
               },
               {
                  name: "FLSA:2353",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353",
               },
               {
                  name: "MDKSA-2004:116",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116",
               },
               {
                  name: "DSA-599",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-599",
               },
               {
                  name: "xpdf-pdf-bo(17818)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
               },
               {
                  name: "RHSA-2005:354",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-354.html",
               },
               {
                  name: "RHSA-2004:543",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-543.html",
               },
               {
                  name: "oval:org.mitre.oval:def:9714",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714",
               },
               {
                  name: "CLA-2004:886",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886",
               },
               {
                  name: "MDKSA-2004:114",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114",
               },
               {
                  name: "GLSA-200410-30",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
               },
               {
                  name: "MDKSA-2004:115",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115",
               },
               {
                  name: "SUSE-SA:2004:039",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
               },
               {
                  name: "FLSA:2352",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2004:592",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-592.html",
            },
            {
               name: "11501",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11501",
            },
            {
               name: "RHSA-2005:066",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-066.html",
            },
            {
               name: "USN-9-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-9-1/",
            },
            {
               name: "MDKSA-2004:113",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
            },
            {
               name: "GLSA-200410-20",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
            },
            {
               name: "DSA-581",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-581",
            },
            {
               name: "DSA-573",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-573",
            },
            {
               name: "FLSA:2353",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353",
            },
            {
               name: "MDKSA-2004:116",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116",
            },
            {
               name: "DSA-599",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-599",
            },
            {
               name: "xpdf-pdf-bo(17818)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
            },
            {
               name: "RHSA-2005:354",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-354.html",
            },
            {
               name: "RHSA-2004:543",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-543.html",
            },
            {
               name: "oval:org.mitre.oval:def:9714",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714",
            },
            {
               name: "CLA-2004:886",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886",
            },
            {
               name: "MDKSA-2004:114",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114",
            },
            {
               name: "GLSA-200410-30",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
            },
            {
               name: "MDKSA-2004:115",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115",
            },
            {
               name: "SUSE-SA:2004:039",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
            },
            {
               name: "FLSA:2352",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0888",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2004:592",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-592.html",
                  },
                  {
                     name: "11501",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11501",
                  },
                  {
                     name: "RHSA-2005:066",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-066.html",
                  },
                  {
                     name: "USN-9-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-9-1/",
                  },
                  {
                     name: "MDKSA-2004:113",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
                  },
                  {
                     name: "GLSA-200410-20",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
                  },
                  {
                     name: "DSA-581",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-581",
                  },
                  {
                     name: "DSA-573",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-573",
                  },
                  {
                     name: "FLSA:2353",
                     refsource: "FEDORA",
                     url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353",
                  },
                  {
                     name: "MDKSA-2004:116",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116",
                  },
                  {
                     name: "DSA-599",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-599",
                  },
                  {
                     name: "xpdf-pdf-bo(17818)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
                  },
                  {
                     name: "RHSA-2005:354",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-354.html",
                  },
                  {
                     name: "RHSA-2004:543",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-543.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9714",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714",
                  },
                  {
                     name: "CLA-2004:886",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886",
                  },
                  {
                     name: "MDKSA-2004:114",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114",
                  },
                  {
                     name: "GLSA-200410-30",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
                  },
                  {
                     name: "MDKSA-2004:115",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115",
                  },
                  {
                     name: "SUSE-SA:2004:039",
                     refsource: "SUSE",
                     url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
                  },
                  {
                     name: "FLSA:2352",
                     refsource: "FEDORA",
                     url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0888",
      datePublished: "2004-10-26T04:00:00",
      dateReserved: "2004-09-22T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.615Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-3378 (GCVE-0-2006-3378)
Vulnerability from cvelistv5
Published
2006-07-06 20:00
Modified
2024-08-07 18:23
Severity ?
Summary
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
References
http://secunia.com/advisories/21480third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/26995vdb-entry, x_refsource_OSVDB
http://www.debian.org/security/2006/dsa-1150vendor-advisory, x_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-308-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/18850vdb-entry, x_refsource_BID
http://secunia.com/advisories/20966third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20950third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T18:23:21.269Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "21480",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/21480",
               },
               {
                  name: "26995",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/26995",
               },
               {
                  name: "DSA-1150",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1150",
               },
               {
                  name: "USN-308-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-308-1",
               },
               {
                  name: "18850",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/18850",
               },
               {
                  name: "20966",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20966",
               },
               {
                  name: "20950",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20950",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-07-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2006-07-13T09:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "21480",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/21480",
            },
            {
               name: "26995",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/26995",
            },
            {
               name: "DSA-1150",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1150",
            },
            {
               name: "USN-308-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-308-1",
            },
            {
               name: "18850",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/18850",
            },
            {
               name: "20966",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20966",
            },
            {
               name: "20950",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20950",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-3378",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "21480",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/21480",
                  },
                  {
                     name: "26995",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/26995",
                  },
                  {
                     name: "DSA-1150",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1150",
                  },
                  {
                     name: "USN-308-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-308-1",
                  },
                  {
                     name: "18850",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/18850",
                  },
                  {
                     name: "20966",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20966",
                  },
                  {
                     name: "20950",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20950",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-3378",
      datePublished: "2006-07-06T20:00:00",
      dateReserved: "2006-07-06T00:00:00",
      dateUpdated: "2024-08-07T18:23:21.269Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2008-5104 (GCVE-0-2008-5104)
Vulnerability from cvelistv5
Published
2008-11-17 18:00
Modified
2024-08-07 10:40
Severity ?
Summary
Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T10:40:16.998Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "32697",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/32697",
               },
               {
                  name: "32292",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/32292",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
               },
               {
                  name: "USN-670-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-670-1",
               },
               {
                  name: "vmbuilder-root-default-password(46881)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2008-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-07T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "32697",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/32697",
            },
            {
               name: "32292",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/32292",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
            },
            {
               name: "USN-670-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-670-1",
            },
            {
               name: "vmbuilder-root-default-password(46881)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2008-5104",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "32697",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/32697",
                  },
                  {
                     name: "32292",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/32292",
                  },
                  {
                     name: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
                     refsource: "CONFIRM",
                     url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
                  },
                  {
                     name: "USN-670-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-670-1",
                  },
                  {
                     name: "vmbuilder-root-default-password(46881)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881",
                  },
                  {
                     name: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
                     refsource: "CONFIRM",
                     url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2008-5104",
      datePublished: "2008-11-17T18:00:00",
      dateReserved: "2008-11-17T00:00:00",
      dateUpdated: "2024-08-07T10:40:16.998Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1013 (GCVE-0-2004-1013)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:38
Severity ?
Summary
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:38:59.800Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "DSA-597",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-597",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/152004.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
               },
               {
                  name: "MDKSA-2004:139",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
               },
               {
                  name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
               },
               {
                  name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
               },
               {
                  name: "13274",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/13274/",
               },
               {
                  name: "GLSA-200411-34",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
               },
               {
                  name: "USN-31-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-31-1/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) \"body[p\", (2) \"binary[p\", or (3) \"binary[p\") that cause an index increment error that leads to an out-of-bounds memory corruption.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-06T21:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "DSA-597",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-597",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/152004.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
            },
            {
               name: "MDKSA-2004:139",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
            },
            {
               name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
            },
            {
               name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
            },
            {
               name: "13274",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/13274/",
            },
            {
               name: "GLSA-200411-34",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
            },
            {
               name: "USN-31-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-31-1/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1013",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) \"body[p\", (2) \"binary[p\", or (3) \"binary[p\") that cause an index increment error that leads to an out-of-bounds memory corruption.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "DSA-597",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-597",
                  },
                  {
                     name: "http://security.e-matters.de/advisories/152004.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/152004.html",
                  },
                  {
                     name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                     refsource: "CONFIRM",
                     url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
                  },
                  {
                     name: "MDKSA-2004:139",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
                  },
                  {
                     name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
                  },
                  {
                     name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released",
                     refsource: "MLIST",
                     url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
                  },
                  {
                     name: "13274",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/13274/",
                  },
                  {
                     name: "GLSA-200411-34",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
                  },
                  {
                     name: "USN-31-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-31-1/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1013",
      datePublished: "2004-12-01T05:00:00",
      dateReserved: "2004-11-04T00:00:00",
      dateUpdated: "2024-08-08T00:38:59.800Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-0151 (GCVE-0-2006-0151)
Vulnerability from cvelistv5
Published
2006-01-09 23:00
Modified
2024-08-07 16:25
Severity ?
Summary
sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.
References
http://www.trustix.org/errata/2006/0010vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/18549third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18558third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/18363third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_02_sr.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/18358third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/16184vdb-entry, x_refsource_BID
http://secunia.com/advisories/19016third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18906third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-946vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2006:159vendor-advisory, x_refsource_MANDRIVA
https://usn.ubuntu.com/235-2/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/21692third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T16:25:33.651Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "2006-0010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2006/0010",
               },
               {
                  name: "18549",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18549",
               },
               {
                  name: "18558",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18558",
               },
               {
                  name: "SSA:2006-045-08",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822",
               },
               {
                  name: "18363",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18363",
               },
               {
                  name: "SUSE-SR:2006:002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html",
               },
               {
                  name: "18358",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18358",
               },
               {
                  name: "16184",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/16184",
               },
               {
                  name: "19016",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19016",
               },
               {
                  name: "18906",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18906",
               },
               {
                  name: "DSA-946",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-946",
               },
               {
                  name: "MDKSA-2006:159",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159",
               },
               {
                  name: "USN-235-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/235-2/",
               },
               {
                  name: "21692",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/21692",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-01-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "2006-0010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2006/0010",
            },
            {
               name: "18549",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18549",
            },
            {
               name: "18558",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18558",
            },
            {
               name: "SSA:2006-045-08",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822",
            },
            {
               name: "18363",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18363",
            },
            {
               name: "SUSE-SR:2006:002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html",
            },
            {
               name: "18358",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18358",
            },
            {
               name: "16184",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/16184",
            },
            {
               name: "19016",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19016",
            },
            {
               name: "18906",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18906",
            },
            {
               name: "DSA-946",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-946",
            },
            {
               name: "MDKSA-2006:159",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159",
            },
            {
               name: "USN-235-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/235-2/",
            },
            {
               name: "21692",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/21692",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-0151",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "2006-0010",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2006/0010",
                  },
                  {
                     name: "18549",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18549",
                  },
                  {
                     name: "18558",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18558",
                  },
                  {
                     name: "SSA:2006-045-08",
                     refsource: "SLACKWARE",
                     url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822",
                  },
                  {
                     name: "18363",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18363",
                  },
                  {
                     name: "SUSE-SR:2006:002",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html",
                  },
                  {
                     name: "18358",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18358",
                  },
                  {
                     name: "16184",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/16184",
                  },
                  {
                     name: "19016",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19016",
                  },
                  {
                     name: "18906",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/18906",
                  },
                  {
                     name: "DSA-946",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-946",
                  },
                  {
                     name: "MDKSA-2006:159",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159",
                  },
                  {
                     name: "USN-235-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/235-2/",
                  },
                  {
                     name: "21692",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/21692",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-0151",
      datePublished: "2006-01-09T23:00:00",
      dateReserved: "2006-01-09T00:00:00",
      dateUpdated: "2024-08-07T16:25:33.651Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-1527 (GCVE-0-2005-1527)
Vulnerability from cvelistv5
Published
2005-08-15 04:00
Modified
2024-08-07 21:51
Severity ?
Summary
Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
References
http://www.osvdb.org/18696vdb-entry, x_refsource_OSVDB
https://usn.ubuntu.com/167-1/vendor-advisory, x_refsource_UBUNTU
http://www.securiteam.com/unixfocus/5DP0J00GKE.htmlx_refsource_MISC
http://www.novell.com/linux/security/advisories/2005_19_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2005/dsa-892vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/17463third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/21769vdb-entry, x_refsource_XF
http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=falsethird-party-advisory, x_refsource_IDEFENSE
http://secunia.com/advisories/16412third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1014636vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/14525vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T21:51:50.264Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "18696",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/18696",
               },
               {
                  name: "USN-167-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/167-1/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.securiteam.com/unixfocus/5DP0J00GKE.html",
               },
               {
                  name: "SUSE-SR:2005:019",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2005_19_sr.html",
               },
               {
                  name: "DSA-892",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-892",
               },
               {
                  name: "17463",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/17463",
               },
               {
                  name: "awstats-eval-execute-commands(21769)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769",
               },
               {
                  name: "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_IDEFENSE",
                     "x_transferred",
                  ],
                  url: "http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false",
               },
               {
                  name: "16412",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/16412",
               },
               {
                  name: "1014636",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1014636",
               },
               {
                  name: "14525",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/14525",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-08-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "18696",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/18696",
            },
            {
               name: "USN-167-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/167-1/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.securiteam.com/unixfocus/5DP0J00GKE.html",
            },
            {
               name: "SUSE-SR:2005:019",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2005_19_sr.html",
            },
            {
               name: "DSA-892",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-892",
            },
            {
               name: "17463",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/17463",
            },
            {
               name: "awstats-eval-execute-commands(21769)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769",
            },
            {
               name: "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability",
               tags: [
                  "third-party-advisory",
                  "x_refsource_IDEFENSE",
               ],
               url: "http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false",
            },
            {
               name: "16412",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/16412",
            },
            {
               name: "1014636",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1014636",
            },
            {
               name: "14525",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/14525",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-1527",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "18696",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/18696",
                  },
                  {
                     name: "USN-167-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/167-1/",
                  },
                  {
                     name: "http://www.securiteam.com/unixfocus/5DP0J00GKE.html",
                     refsource: "MISC",
                     url: "http://www.securiteam.com/unixfocus/5DP0J00GKE.html",
                  },
                  {
                     name: "SUSE-SR:2005:019",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2005_19_sr.html",
                  },
                  {
                     name: "DSA-892",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2005/dsa-892",
                  },
                  {
                     name: "17463",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/17463",
                  },
                  {
                     name: "awstats-eval-execute-commands(21769)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769",
                  },
                  {
                     name: "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability",
                     refsource: "IDEFENSE",
                     url: "http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false",
                  },
                  {
                     name: "16412",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/16412",
                  },
                  {
                     name: "1014636",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1014636",
                  },
                  {
                     name: "14525",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/14525",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-1527",
      datePublished: "2005-08-15T04:00:00",
      dateReserved: "2005-05-12T00:00:00",
      dateUpdated: "2024-08-07T21:51:50.264Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-2637 (GCVE-0-2007-2637)
Vulnerability from cvelistv5
Published
2007-05-13 23:00
Modified
2024-08-07 13:49
Severity ?
Summary
MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.
References
http://osvdb.org/36269vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/29262third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25208third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/34474vdb-entry, x_refsource_XF
http://www.ubuntu.com/usn/usn-458-1vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2008/dsa-1514vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T13:49:56.023Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "36269",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/36269",
               },
               {
                  name: "29262",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/29262",
               },
               {
                  name: "25208",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25208",
               },
               {
                  name: "moinmoin-acl-information-disclosure(34474)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474",
               },
               {
                  name: "USN-458-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-458-1",
               },
               {
                  name: "DSA-1514",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2008/dsa-1514",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-05-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "36269",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/36269",
            },
            {
               name: "29262",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/29262",
            },
            {
               name: "25208",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25208",
            },
            {
               name: "moinmoin-acl-information-disclosure(34474)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474",
            },
            {
               name: "USN-458-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-458-1",
            },
            {
               name: "DSA-1514",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2008/dsa-1514",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-2637",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "36269",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/36269",
                  },
                  {
                     name: "29262",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/29262",
                  },
                  {
                     name: "25208",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25208",
                  },
                  {
                     name: "moinmoin-acl-information-disclosure(34474)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474",
                  },
                  {
                     name: "USN-458-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-458-1",
                  },
                  {
                     name: "DSA-1514",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2008/dsa-1514",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-2637",
      datePublished: "2007-05-13T23:00:00",
      dateReserved: "2007-05-13T00:00:00",
      dateUpdated: "2024-08-07T13:49:56.023Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2009-0578 (GCVE-0-2009-0578)
Vulnerability from cvelistv5
Published
2009-03-05 02:00
Modified
2024-08-07 04:40
Severity ?
Summary
GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T04:40:05.071Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-727-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-727-1",
               },
               {
                  name: "oval:org.mitre.oval:def:8931",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931",
               },
               {
                  name: "33966",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/33966",
               },
               {
                  name: "networkmanager-dbus-security-bypass(49063)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49063",
               },
               {
                  name: "34067",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34067",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
               },
               {
                  name: "1021909",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1021909",
               },
               {
                  name: "SUSE-SR:2009:009",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
               },
               {
                  name: "SUSE-SA:2009:013",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
               },
               {
                  name: "RHSA-2009:0361",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
               },
               {
                  name: "34473",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34473",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2009-03-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-28T12:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "USN-727-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-727-1",
            },
            {
               name: "oval:org.mitre.oval:def:8931",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931",
            },
            {
               name: "33966",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/33966",
            },
            {
               name: "networkmanager-dbus-security-bypass(49063)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49063",
            },
            {
               name: "34067",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34067",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
            },
            {
               name: "1021909",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1021909",
            },
            {
               name: "SUSE-SR:2009:009",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
            },
            {
               name: "SUSE-SA:2009:013",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
            },
            {
               name: "RHSA-2009:0361",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
            },
            {
               name: "34473",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34473",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2009-0578",
      datePublished: "2009-03-05T02:00:00",
      dateReserved: "2009-02-13T00:00:00",
      dateUpdated: "2024-08-07T04:40:05.071Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-3624 (GCVE-0-2005-3624)
Vulnerability from cvelistv5
Published
2006-01-06 22:00
Modified
2024-08-07 23:17
Severity ?
Summary
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.
References
http://www.securityfocus.com/bid/16143vdb-entry, x_refsource_BID
http://www.debian.org/security/2005/dsa-932vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18349third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18147third-party-advisory, x_refsource_SECUNIA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txtvendor-advisory, x_refsource_SCO
http://scary.beasts.org/security/CESA-2005-003.txtx_refsource_MISC
http://www.kde.org/info/security/advisory-20051207-2.txtx_refsource_CONFIRM
http://secunia.com/advisories/18679third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18312third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18644third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/236-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/18425third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18373third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18303third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-931vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18554third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/19230third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1vendor-advisory, x_refsource_SUNALERT
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2006/dsa-962vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2006-0163.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2005/dsa-937vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18398third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/427053/100/0/threadedvendor-advisory, x_refsource_FEDORA
http://www.trustix.org/errata/2006/0002/vendor-advisory, x_refsource_TRUSTIX
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2006/dsa-936vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/18329third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18463third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18642third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18674third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18313third-party-advisory, x_refsource_SECUNIA
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-Uvendor-advisory, x_refsource_SGI
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-Uvendor-advisory, x_refsource_SGI
http://secunia.com/advisories/18448third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18436third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18428third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18380third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18423third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18416third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2006-0177.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2007/2280vdb-entry, x_refsource_VUPEN
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/18407third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18332third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18517third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18582third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18534third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/18908third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25729third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18414third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18338third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008vendor-advisory, x_refsource_MANDRIVA
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-Uvendor-advisory, x_refsource_SGI
http://www.redhat.com/support/errata/RHSA-2006-0160.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010vendor-advisory, x_refsource_MANDRAKE
http://www.debian.org/security/2005/dsa-940vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2006/0047vdb-entry, x_refsource_VUPEN
http://www.gentoo.org/security/en/glsa/glsa-200601-17.xmlvendor-advisory, x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/24022vdb-entry, x_refsource_XF
http://secunia.com/advisories/18389third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437vdb-entry, signature, x_refsource_OVAL
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/19377third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/archive/1/427990/100/0/threadedvendor-advisory, x_refsource_FEDORA
http://www.debian.org/security/2006/dsa-961vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18675third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18913third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-938vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18334third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/18375third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-950vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18387third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/18385third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T23:17:23.457Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "16143",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/16143",
               },
               {
                  name: "DSA-932",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-932",
               },
               {
                  name: "18349",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18349",
               },
               {
                  name: "18147",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18147",
               },
               {
                  name: "SCOSA-2006.15",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://scary.beasts.org/security/CESA-2005-003.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
               },
               {
                  name: "18679",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18679",
               },
               {
                  name: "18312",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18312",
               },
               {
                  name: "18644",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18644",
               },
               {
                  name: "USN-236-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/236-1/",
               },
               {
                  name: "18425",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18425",
               },
               {
                  name: "18373",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18373",
               },
               {
                  name: "18303",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18303",
               },
               {
                  name: "DSA-931",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-931",
               },
               {
                  name: "18554",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18554",
               },
               {
                  name: "MDKSA-2006:003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
               },
               {
                  name: "19230",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19230",
               },
               {
                  name: "102972",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
               },
               {
                  name: "MDKSA-2006:012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
               },
               {
                  name: "DSA-962",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-962",
               },
               {
                  name: "RHSA-2006:0163",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
               },
               {
                  name: "DSA-937",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-937",
               },
               {
                  name: "18398",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18398",
               },
               {
                  name: "FLSA-2006:176751",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
               },
               {
                  name: "2006-0002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2006/0002/",
               },
               {
                  name: "SUSE-SA:2006:001",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
               },
               {
                  name: "DSA-936",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-936",
               },
               {
                  name: "FEDORA-2005-026",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
               },
               {
                  name: "18329",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18329",
               },
               {
                  name: "18463",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18463",
               },
               {
                  name: "18642",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18642",
               },
               {
                  name: "18674",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18674",
               },
               {
                  name: "MDKSA-2006:005",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
               },
               {
                  name: "18313",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18313",
               },
               {
                  name: "20051201-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
               },
               {
                  name: "20060101-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
               },
               {
                  name: "18448",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18448",
               },
               {
                  name: "18436",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18436",
               },
               {
                  name: "18428",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18428",
               },
               {
                  name: "18380",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18380",
               },
               {
                  name: "18423",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18423",
               },
               {
                  name: "18416",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18416",
               },
               {
                  name: "RHSA-2006:0177",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
               },
               {
                  name: "ADV-2007-2280",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/2280",
               },
               {
                  name: "GLSA-200601-02",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
               },
               {
                  name: "18407",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18407",
               },
               {
                  name: "18332",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18332",
               },
               {
                  name: "18517",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18517",
               },
               {
                  name: "18582",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18582",
               },
               {
                  name: "18534",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18534",
               },
               {
                  name: "SSA:2006-045-09",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
               },
               {
                  name: "18908",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18908",
               },
               {
                  name: "25729",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25729",
               },
               {
                  name: "18414",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18414",
               },
               {
                  name: "MDKSA-2006:006",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
               },
               {
                  name: "18338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18338",
               },
               {
                  name: "MDKSA-2006:008",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
               },
               {
                  name: "20060201-01-U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
               },
               {
                  name: "RHSA-2006:0160",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
               },
               {
                  name: "MDKSA-2006:010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
               },
               {
                  name: "DSA-940",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-940",
               },
               {
                  name: "MDKSA-2006:004",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
               },
               {
                  name: "ADV-2006-0047",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/0047",
               },
               {
                  name: "GLSA-200601-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
               },
               {
                  name: "xpdf-ccitt-faxstream-bo(24022)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022",
               },
               {
                  name: "18389",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18389",
               },
               {
                  name: "oval:org.mitre.oval:def:9437",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437",
               },
               {
                  name: "SSA:2006-045-04",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
               },
               {
                  name: "19377",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19377",
               },
               {
                  name: "FEDORA-2005-025",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
               },
               {
                  name: "FLSA:175404",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
               },
               {
                  name: "DSA-961",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-961",
               },
               {
                  name: "18675",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18675",
               },
               {
                  name: "18913",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18913",
               },
               {
                  name: "DSA-938",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2005/dsa-938",
               },
               {
                  name: "18334",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18334",
               },
               {
                  name: "18375",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18375",
               },
               {
                  name: "DSA-950",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-950",
               },
               {
                  name: "18387",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18387",
               },
               {
                  name: "MDKSA-2006:011",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
               },
               {
                  name: "18385",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/18385",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-01-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-19T14:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "16143",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/16143",
            },
            {
               name: "DSA-932",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-932",
            },
            {
               name: "18349",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18349",
            },
            {
               name: "18147",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18147",
            },
            {
               name: "SCOSA-2006.15",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://scary.beasts.org/security/CESA-2005-003.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
            },
            {
               name: "18679",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18679",
            },
            {
               name: "18312",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18312",
            },
            {
               name: "18644",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18644",
            },
            {
               name: "USN-236-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/236-1/",
            },
            {
               name: "18425",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18425",
            },
            {
               name: "18373",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18373",
            },
            {
               name: "18303",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18303",
            },
            {
               name: "DSA-931",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-931",
            },
            {
               name: "18554",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18554",
            },
            {
               name: "MDKSA-2006:003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
            },
            {
               name: "19230",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19230",
            },
            {
               name: "102972",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
            },
            {
               name: "MDKSA-2006:012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
            },
            {
               name: "DSA-962",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-962",
            },
            {
               name: "RHSA-2006:0163",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
            },
            {
               name: "DSA-937",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-937",
            },
            {
               name: "18398",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18398",
            },
            {
               name: "FLSA-2006:176751",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
            },
            {
               name: "2006-0002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2006/0002/",
            },
            {
               name: "SUSE-SA:2006:001",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
            },
            {
               name: "DSA-936",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-936",
            },
            {
               name: "FEDORA-2005-026",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
            },
            {
               name: "18329",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18329",
            },
            {
               name: "18463",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18463",
            },
            {
               name: "18642",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18642",
            },
            {
               name: "18674",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18674",
            },
            {
               name: "MDKSA-2006:005",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
            },
            {
               name: "18313",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18313",
            },
            {
               name: "20051201-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
            },
            {
               name: "20060101-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
            },
            {
               name: "18448",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18448",
            },
            {
               name: "18436",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18436",
            },
            {
               name: "18428",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18428",
            },
            {
               name: "18380",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18380",
            },
            {
               name: "18423",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18423",
            },
            {
               name: "18416",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18416",
            },
            {
               name: "RHSA-2006:0177",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
            },
            {
               name: "ADV-2007-2280",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/2280",
            },
            {
               name: "GLSA-200601-02",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
            },
            {
               name: "18407",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18407",
            },
            {
               name: "18332",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18332",
            },
            {
               name: "18517",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18517",
            },
            {
               name: "18582",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18582",
            },
            {
               name: "18534",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18534",
            },
            {
               name: "SSA:2006-045-09",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
            },
            {
               name: "18908",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18908",
            },
            {
               name: "25729",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25729",
            },
            {
               name: "18414",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18414",
            },
            {
               name: "MDKSA-2006:006",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
            },
            {
               name: "18338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18338",
            },
            {
               name: "MDKSA-2006:008",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
            },
            {
               name: "20060201-01-U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
            },
            {
               name: "RHSA-2006:0160",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
            },
            {
               name: "MDKSA-2006:010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
            },
            {
               name: "DSA-940",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-940",
            },
            {
               name: "MDKSA-2006:004",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
            },
            {
               name: "ADV-2006-0047",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/0047",
            },
            {
               name: "GLSA-200601-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
            },
            {
               name: "xpdf-ccitt-faxstream-bo(24022)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022",
            },
            {
               name: "18389",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18389",
            },
            {
               name: "oval:org.mitre.oval:def:9437",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437",
            },
            {
               name: "SSA:2006-045-04",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
            },
            {
               name: "19377",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19377",
            },
            {
               name: "FEDORA-2005-025",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
            },
            {
               name: "FLSA:175404",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
            },
            {
               name: "DSA-961",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-961",
            },
            {
               name: "18675",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18675",
            },
            {
               name: "18913",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18913",
            },
            {
               name: "DSA-938",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2005/dsa-938",
            },
            {
               name: "18334",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18334",
            },
            {
               name: "18375",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18375",
            },
            {
               name: "DSA-950",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-950",
            },
            {
               name: "18387",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18387",
            },
            {
               name: "MDKSA-2006:011",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
            },
            {
               name: "18385",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/18385",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2005-3624",
      datePublished: "2006-01-06T22:00:00",
      dateReserved: "2005-11-16T00:00:00",
      dateUpdated: "2024-08-07T23:17:23.457Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0983 (GCVE-0-2004-0983)
Vulnerability from cvelistv5
Published
2004-11-19 05:00
Modified
2024-08-08 00:38
Severity ?
Summary
The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:38:59.645Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2004:635",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-635.html",
               },
               {
                  name: "MDKSA-2004:128",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128",
               },
               {
                  name: "11618",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11618",
               },
               {
                  name: "oval:org.mitre.oval:def:10268",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268",
               },
               {
                  name: "USN-20-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/20-1/",
               },
               {
                  name: "DSA-586",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-586",
               },
               {
                  name: "ruby-cgi-dos(17985)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2004:635",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-635.html",
            },
            {
               name: "MDKSA-2004:128",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128",
            },
            {
               name: "11618",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11618",
            },
            {
               name: "oval:org.mitre.oval:def:10268",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268",
            },
            {
               name: "USN-20-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/20-1/",
            },
            {
               name: "DSA-586",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-586",
            },
            {
               name: "ruby-cgi-dos(17985)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0983",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2004:635",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-635.html",
                  },
                  {
                     name: "MDKSA-2004:128",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128",
                  },
                  {
                     name: "11618",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11618",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10268",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268",
                  },
                  {
                     name: "USN-20-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/20-1/",
                  },
                  {
                     name: "DSA-586",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-586",
                  },
                  {
                     name: "ruby-cgi-dos(17985)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0983",
      datePublished: "2004-11-19T05:00:00",
      dateReserved: "2004-10-24T00:00:00",
      dateUpdated: "2024-08-08T00:38:59.645Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-4137 (GCVE-0-2007-4137)
Vulnerability from cvelistv5
Published
2007-09-18 19:00
Modified
2024-08-07 14:46
Severity ?
Summary
Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
References
http://bugs.gentoo.org/show_bug.cgi?id=192472x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2007:183vendor-advisory, x_refsource_MANDRIVA
http://www.novell.com/linux/security/advisories/2007_19_sr.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/26868third-party-advisory, x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-424.htmx_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-1751x_refsource_CONFIRM
http://secunia.com/advisories/26811third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/27053third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27996third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27275third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27382third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26857third-party-advisory, x_refsource_SECUNIA
http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119x_refsource_CONFIRM
http://secunia.com/advisories/26778third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=269001x_refsource_MISC
http://secunia.com/advisories/26882third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26987third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200710-28.xmlvendor-advisory, x_refsource_GENTOO
http://www.vupen.com/english/advisories/2007/3144vdb-entry, x_refsource_VUPEN
ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.ascvendor-advisory, x_refsource_SGI
http://dist.trolltech.com/developer/download/175791_4.diffx_refsource_MISC
http://osvdb.org/39384vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/26804third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26782third-party-advisory, x_refsource_SECUNIA
http://dist.trolltech.com/developer/download/175791_3.diffx_refsource_MISC
http://fedoranews.org/updates/FEDORA-2007-703.shtmlvendor-advisory, x_refsource_FEDORA
http://fedoranews.org/updates/FEDORA-2007-221.shtmlvendor-advisory, x_refsource_FEDORA
http://security.gentoo.org/glsa/glsa-200712-08.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/28021third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0883.htmlvendor-advisory, x_refsource_REDHAT
http://securitytracker.com/id?1018688vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/481498/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.ubuntu.com/usn/usn-513-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/25657vdb-entry, x_refsource_BID
http://www.debian.org/security/2007/dsa-1426vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T14:46:38.696Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.gentoo.org/show_bug.cgi?id=192472",
               },
               {
                  name: "MDKSA-2007:183",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183",
               },
               {
                  name: "SUSE-SR:2007:019",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html",
               },
               {
                  name: "26868",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26868",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.rpath.com/browse/RPL-1751",
               },
               {
                  name: "26811",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26811",
               },
               {
                  name: "oval:org.mitre.oval:def:11159",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159",
               },
               {
                  name: "27053",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27053",
               },
               {
                  name: "27996",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27996",
               },
               {
                  name: "27275",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27275",
               },
               {
                  name: "27382",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27382",
               },
               {
                  name: "26857",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26857",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119",
               },
               {
                  name: "26778",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26778",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=269001",
               },
               {
                  name: "26882",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26882",
               },
               {
                  name: "26987",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26987",
               },
               {
                  name: "GLSA-200710-28",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200710-28.xml",
               },
               {
                  name: "ADV-2007-3144",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/3144",
               },
               {
                  name: "20070901-01-P",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://dist.trolltech.com/developer/download/175791_4.diff",
               },
               {
                  name: "39384",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/39384",
               },
               {
                  name: "26804",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26804",
               },
               {
                  name: "26782",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26782",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://dist.trolltech.com/developer/download/175791_3.diff",
               },
               {
                  name: "FEDORA-2007-703",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://fedoranews.org/updates/FEDORA-2007-703.shtml",
               },
               {
                  name: "FEDORA-2007-2216",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://fedoranews.org/updates/FEDORA-2007-221.shtml",
               },
               {
                  name: "GLSA-200712-08",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200712-08.xml",
               },
               {
                  name: "28021",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28021",
               },
               {
                  name: "RHSA-2007:0883",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0883.html",
               },
               {
                  name: "1018688",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1018688",
               },
               {
                  name: "20071004 FLEA-2007-0059-1 qt qt-tools",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/481498/100/0/threaded",
               },
               {
                  name: "USN-513-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-513-1",
               },
               {
                  name: "25657",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/25657",
               },
               {
                  name: "DSA-1426",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2007/dsa-1426",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-09-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-15T20:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.gentoo.org/show_bug.cgi?id=192472",
            },
            {
               name: "MDKSA-2007:183",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183",
            },
            {
               name: "SUSE-SR:2007:019",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html",
            },
            {
               name: "26868",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26868",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.rpath.com/browse/RPL-1751",
            },
            {
               name: "26811",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26811",
            },
            {
               name: "oval:org.mitre.oval:def:11159",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159",
            },
            {
               name: "27053",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27053",
            },
            {
               name: "27996",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27996",
            },
            {
               name: "27275",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27275",
            },
            {
               name: "27382",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27382",
            },
            {
               name: "26857",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26857",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119",
            },
            {
               name: "26778",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26778",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=269001",
            },
            {
               name: "26882",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26882",
            },
            {
               name: "26987",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26987",
            },
            {
               name: "GLSA-200710-28",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200710-28.xml",
            },
            {
               name: "ADV-2007-3144",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/3144",
            },
            {
               name: "20070901-01-P",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://dist.trolltech.com/developer/download/175791_4.diff",
            },
            {
               name: "39384",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/39384",
            },
            {
               name: "26804",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26804",
            },
            {
               name: "26782",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26782",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://dist.trolltech.com/developer/download/175791_3.diff",
            },
            {
               name: "FEDORA-2007-703",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://fedoranews.org/updates/FEDORA-2007-703.shtml",
            },
            {
               name: "FEDORA-2007-2216",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://fedoranews.org/updates/FEDORA-2007-221.shtml",
            },
            {
               name: "GLSA-200712-08",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200712-08.xml",
            },
            {
               name: "28021",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28021",
            },
            {
               name: "RHSA-2007:0883",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0883.html",
            },
            {
               name: "1018688",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1018688",
            },
            {
               name: "20071004 FLEA-2007-0059-1 qt qt-tools",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/481498/100/0/threaded",
            },
            {
               name: "USN-513-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-513-1",
            },
            {
               name: "25657",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/25657",
            },
            {
               name: "DSA-1426",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2007/dsa-1426",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2007-4137",
      datePublished: "2007-09-18T19:00:00",
      dateReserved: "2007-08-02T00:00:00",
      dateUpdated: "2024-08-07T14:46:38.696Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1151 (GCVE-0-2004-1151)
Vulnerability from cvelistv5
Published
2004-12-08 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:01.045Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://linux.bkbits.net:8080/linux-2.6/cset%401.2079",
               },
               {
                  name: "MDKSA-2005:022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
               },
               {
                  name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
               },
               {
                  name: "SUSE-SA:2004:044",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ",
               },
               {
                  name: "[linux-kernel] 20041130 Buffer overrun in arch/x86_64/sys_ia32.c:sys32_ni_syscall()",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-10-17T13:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://linux.bkbits.net:8080/linux-2.6/cset%401.2079",
            },
            {
               name: "MDKSA-2005:022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
            },
            {
               name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
            },
            {
               name: "SUSE-SA:2004:044",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ",
            },
            {
               name: "[linux-kernel] 20041130 Buffer overrun in arch/x86_64/sys_ia32.c:sys32_ni_syscall()",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1151",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://linux.bkbits.net:8080/linux-2.6/cset@1.2079",
                     refsource: "MISC",
                     url: "http://linux.bkbits.net:8080/linux-2.6/cset@1.2079",
                  },
                  {
                     name: "MDKSA-2005:022",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
                  },
                  {
                     name: "20041214 [USN-38-1] Linux kernel vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
                  },
                  {
                     name: "SUSE-SA:2004:044",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
                  },
                  {
                     name: "http://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQ",
                     refsource: "MISC",
                     url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQ",
                  },
                  {
                     name: "[linux-kernel] 20041130 Buffer overrun in arch/x86_64/sys_ia32.c:sys32_ni_syscall()",
                     refsource: "MLIST",
                     url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1151",
      datePublished: "2004-12-08T05:00:00",
      dateReserved: "2004-12-07T00:00:00",
      dateUpdated: "2024-08-08T00:39:01.045Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-1352 (GCVE-0-2007-1352)
Vulnerability from cvelistv5
Published
2007-04-06 01:00
Modified
2024-08-07 12:50
Severity ?
Summary
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
References
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502third-party-advisory, x_refsource_IDEFENSE
http://secunia.com/advisories/24745third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/33937third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24771third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24770third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25006third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24756third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/23283vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2007-0126.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/23300vdb-entry, x_refsource_BID
http://support.apple.com/kb/HT3438x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200705-10.xmlvendor-advisory, x_refsource_GENTOO
http://www.ubuntu.com/usn/usn-448-1vendor-advisory, x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.mandriva.com/security/advisories?name=MDKSA-2007:080vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/24758third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1017857vdb-entry, x_refsource_SECTRACK
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243vdb-entry, signature, x_refsource_OVAL
http://support.avaya.com/elmodocs2/security/ASA-2007-178.htmx_refsource_CONFIRM
http://secunia.com/advisories/25195third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2007-0125.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24741third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.htmlvendor-advisory, x_refsource_APPLE
http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.htmlmailing-list, x_refsource_MLIST
http://secunia.com/advisories/24791third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_27_x.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2007/dsa-1294vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/24765third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25216third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/33419vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/464686/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/464816/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2007/1548vdb-entry, x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1vendor-advisory, x_refsource_SUNALERT
http://www.vupen.com/english/advisories/2007/1217vdb-entry, x_refsource_VUPEN
http://www.openbsd.org/errata40.html#011_xorgvendor-advisory, x_refsource_OPENBSD
https://issues.rpath.com/browse/RPL-1213x_refsource_CONFIRM
http://secunia.com/advisories/25004third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25305third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0132.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/24772third-party-advisory, x_refsource_SECUNIA
http://www.openbsd.org/errata39.html#021_xorgvendor-advisory, x_refsource_OPENBSD
http://issues.foresightlinux.org/browse/FL-223x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2007:079vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T12:50:35.267Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20070403 Multiple Vendor X Server fonts.dir File Parsing Integer Overflow Vulnerability",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_IDEFENSE",
                     "x_transferred",
                  ],
                  url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502",
               },
               {
                  name: "24745",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24745",
               },
               {
                  name: "oval:org.mitre.oval:def:10523",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523",
               },
               {
                  name: "33937",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33937",
               },
               {
                  name: "24771",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24771",
               },
               {
                  name: "24770",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24770",
               },
               {
                  name: "25006",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25006",
               },
               {
                  name: "24756",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24756",
               },
               {
                  name: "23283",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23283",
               },
               {
                  name: "RHSA-2007:0126",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
               },
               {
                  name: "23300",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23300",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.apple.com/kb/HT3438",
               },
               {
                  name: "GLSA-200705-10",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
               },
               {
                  name: "USN-448-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-448-1",
               },
               {
                  name: "APPLE-SA-2009-02-12",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
               },
               {
                  name: "MDKSA-2007:080",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
               },
               {
                  name: "24758",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24758",
               },
               {
                  name: "1017857",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1017857",
               },
               {
                  name: "oval:org.mitre.oval:def:13243",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
               },
               {
                  name: "25195",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25195",
               },
               {
                  name: "RHSA-2007:0125",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
               },
               {
                  name: "24741",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24741",
               },
               {
                  name: "APPLE-SA-2007-11-14",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
               },
               {
                  name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
               },
               {
                  name: "24791",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24791",
               },
               {
                  name: "SUSE-SA:2007:027",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
               },
               {
                  name: "DSA-1294",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2007/dsa-1294",
               },
               {
                  name: "24765",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24765",
               },
               {
                  name: "25216",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25216",
               },
               {
                  name: "xorg-fontsdir-bo(33419)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419",
               },
               {
                  name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
               },
               {
                  name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
               },
               {
                  name: "ADV-2007-1548",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/1548",
               },
               {
                  name: "102886",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
               },
               {
                  name: "ADV-2007-1217",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/1217",
               },
               {
                  name: "[4.0] 011: SECURITY FIX: April 4, 2007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENBSD",
                     "x_transferred",
                  ],
                  url: "http://www.openbsd.org/errata40.html#011_xorg",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.rpath.com/browse/RPL-1213",
               },
               {
                  name: "25004",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25004",
               },
               {
                  name: "25305",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25305",
               },
               {
                  name: "RHSA-2007:0132",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
               },
               {
                  name: "24772",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24772",
               },
               {
                  name: "[3.9] 021: SECURITY FIX: April 4, 2007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENBSD",
                     "x_transferred",
                  ],
                  url: "http://www.openbsd.org/errata39.html#021_xorg",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://issues.foresightlinux.org/browse/FL-223",
               },
               {
                  name: "MDKSA-2007:079",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-04-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-16T14:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "20070403 Multiple Vendor X Server fonts.dir File Parsing Integer Overflow Vulnerability",
               tags: [
                  "third-party-advisory",
                  "x_refsource_IDEFENSE",
               ],
               url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502",
            },
            {
               name: "24745",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24745",
            },
            {
               name: "oval:org.mitre.oval:def:10523",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523",
            },
            {
               name: "33937",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33937",
            },
            {
               name: "24771",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24771",
            },
            {
               name: "24770",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24770",
            },
            {
               name: "25006",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25006",
            },
            {
               name: "24756",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24756",
            },
            {
               name: "23283",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23283",
            },
            {
               name: "RHSA-2007:0126",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
            },
            {
               name: "23300",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23300",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.apple.com/kb/HT3438",
            },
            {
               name: "GLSA-200705-10",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
            },
            {
               name: "USN-448-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-448-1",
            },
            {
               name: "APPLE-SA-2009-02-12",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
            },
            {
               name: "MDKSA-2007:080",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
            },
            {
               name: "24758",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24758",
            },
            {
               name: "1017857",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1017857",
            },
            {
               name: "oval:org.mitre.oval:def:13243",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
            },
            {
               name: "25195",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25195",
            },
            {
               name: "RHSA-2007:0125",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
            },
            {
               name: "24741",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24741",
            },
            {
               name: "APPLE-SA-2007-11-14",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
            },
            {
               name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
            },
            {
               name: "24791",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24791",
            },
            {
               name: "SUSE-SA:2007:027",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
            },
            {
               name: "DSA-1294",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2007/dsa-1294",
            },
            {
               name: "24765",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24765",
            },
            {
               name: "25216",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25216",
            },
            {
               name: "xorg-fontsdir-bo(33419)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419",
            },
            {
               name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
            },
            {
               name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
            },
            {
               name: "ADV-2007-1548",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/1548",
            },
            {
               name: "102886",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
            },
            {
               name: "ADV-2007-1217",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/1217",
            },
            {
               name: "[4.0] 011: SECURITY FIX: April 4, 2007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENBSD",
               ],
               url: "http://www.openbsd.org/errata40.html#011_xorg",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.rpath.com/browse/RPL-1213",
            },
            {
               name: "25004",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25004",
            },
            {
               name: "25305",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25305",
            },
            {
               name: "RHSA-2007:0132",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
            },
            {
               name: "24772",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24772",
            },
            {
               name: "[3.9] 021: SECURITY FIX: April 4, 2007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENBSD",
               ],
               url: "http://www.openbsd.org/errata39.html#021_xorg",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://issues.foresightlinux.org/browse/FL-223",
            },
            {
               name: "MDKSA-2007:079",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2007-1352",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20070403 Multiple Vendor X Server fonts.dir File Parsing Integer Overflow Vulnerability",
                     refsource: "IDEFENSE",
                     url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502",
                  },
                  {
                     name: "24745",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24745",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10523",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523",
                  },
                  {
                     name: "33937",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/33937",
                  },
                  {
                     name: "24771",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24771",
                  },
                  {
                     name: "24770",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24770",
                  },
                  {
                     name: "25006",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25006",
                  },
                  {
                     name: "24756",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24756",
                  },
                  {
                     name: "23283",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23283",
                  },
                  {
                     name: "RHSA-2007:0126",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
                  },
                  {
                     name: "23300",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23300",
                  },
                  {
                     name: "http://support.apple.com/kb/HT3438",
                     refsource: "CONFIRM",
                     url: "http://support.apple.com/kb/HT3438",
                  },
                  {
                     name: "GLSA-200705-10",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
                  },
                  {
                     name: "USN-448-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-448-1",
                  },
                  {
                     name: "APPLE-SA-2009-02-12",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                  },
                  {
                     name: "MDKSA-2007:080",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
                  },
                  {
                     name: "24758",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24758",
                  },
                  {
                     name: "1017857",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1017857",
                  },
                  {
                     name: "oval:org.mitre.oval:def:13243",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243",
                  },
                  {
                     name: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
                  },
                  {
                     name: "25195",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25195",
                  },
                  {
                     name: "RHSA-2007:0125",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
                  },
                  {
                     name: "24741",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24741",
                  },
                  {
                     name: "APPLE-SA-2007-11-14",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
                  },
                  {
                     name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont",
                     refsource: "MLIST",
                     url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
                  },
                  {
                     name: "24791",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24791",
                  },
                  {
                     name: "SUSE-SA:2007:027",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
                  },
                  {
                     name: "DSA-1294",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2007/dsa-1294",
                  },
                  {
                     name: "24765",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24765",
                  },
                  {
                     name: "25216",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25216",
                  },
                  {
                     name: "xorg-fontsdir-bo(33419)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419",
                  },
                  {
                     name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
                  },
                  {
                     name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
                  },
                  {
                     name: "ADV-2007-1548",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/1548",
                  },
                  {
                     name: "102886",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
                  },
                  {
                     name: "ADV-2007-1217",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/1217",
                  },
                  {
                     name: "[4.0] 011: SECURITY FIX: April 4, 2007",
                     refsource: "OPENBSD",
                     url: "http://www.openbsd.org/errata40.html#011_xorg",
                  },
                  {
                     name: "https://issues.rpath.com/browse/RPL-1213",
                     refsource: "CONFIRM",
                     url: "https://issues.rpath.com/browse/RPL-1213",
                  },
                  {
                     name: "25004",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25004",
                  },
                  {
                     name: "25305",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25305",
                  },
                  {
                     name: "RHSA-2007:0132",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
                  },
                  {
                     name: "24772",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24772",
                  },
                  {
                     name: "[3.9] 021: SECURITY FIX: April 4, 2007",
                     refsource: "OPENBSD",
                     url: "http://www.openbsd.org/errata39.html#021_xorg",
                  },
                  {
                     name: "http://issues.foresightlinux.org/browse/FL-223",
                     refsource: "CONFIRM",
                     url: "http://issues.foresightlinux.org/browse/FL-223",
                  },
                  {
                     name: "MDKSA-2007:079",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2007-1352",
      datePublished: "2007-04-06T01:00:00",
      dateReserved: "2007-03-08T00:00:00",
      dateUpdated: "2024-08-07T12:50:35.267Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2010-0834 (GCVE-0-2010-0834)
Vulnerability from cvelistv5
Published
2010-08-09 20:00
Modified
2024-09-16 22:24
Severity ?
Summary
The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.
References
http://www.securityfocus.com/bid/42280vdb-entry, x_refsource_BID
http://secunia.com/advisories/40889third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/2015vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/usn-968-1vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T00:59:39.338Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "42280",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/42280",
               },
               {
                  name: "40889",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/40889",
               },
               {
                  name: "ADV-2010-2015",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2010/2015",
               },
               {
                  name: "USN-968-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-968-1",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2010-08-09T20:00:00Z",
            orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
            shortName: "canonical",
         },
         references: [
            {
               name: "42280",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/42280",
            },
            {
               name: "40889",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/40889",
            },
            {
               name: "ADV-2010-2015",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2010/2015",
            },
            {
               name: "USN-968-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-968-1",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@ubuntu.com",
               ID: "CVE-2010-0834",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "42280",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/42280",
                  },
                  {
                     name: "40889",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/40889",
                  },
                  {
                     name: "ADV-2010-2015",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2010/2015",
                  },
                  {
                     name: "USN-968-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-968-1",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
      assignerShortName: "canonical",
      cveId: "CVE-2010-0834",
      datePublished: "2010-08-09T20:00:00Z",
      dateReserved: "2010-03-03T00:00:00Z",
      dateUpdated: "2024-09-16T22:24:37.174Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1337 (GCVE-0-2004-1337)
Vulnerability from cvelistv5
Published
2005-01-06 05:00
Modified
2024-08-08 00:46
Severity ?
Summary
The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:46:12.368Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "linux-security-module-gain-privileges(18673)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673",
               },
               {
                  name: "20041223 Linux 2.6  Kernel Capability LSM Module Local Privilege Elevation",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2",
               },
               {
                  name: "CLA-2005:930",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
               },
               {
                  name: "12093",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/12093",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-12-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "linux-security-module-gain-privileges(18673)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673",
            },
            {
               name: "20041223 Linux 2.6  Kernel Capability LSM Module Local Privilege Elevation",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2",
            },
            {
               name: "CLA-2005:930",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
            },
            {
               name: "12093",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/12093",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1337",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "linux-security-module-gain-privileges(18673)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673",
                  },
                  {
                     name: "20041223 Linux 2.6  Kernel Capability LSM Module Local Privilege Elevation",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2",
                  },
                  {
                     name: "CLA-2005:930",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
                  },
                  {
                     name: "12093",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/12093",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1337",
      datePublished: "2005-01-06T05:00:00",
      dateReserved: "2005-01-06T00:00:00",
      dateUpdated: "2024-08-08T00:46:12.368Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1007 (GCVE-0-2004-1007)
Vulnerability from cvelistv5
Published
2004-11-04 05:00
Modified
2024-08-08 00:38
Severity ?
Summary
The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:38:59.725Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01",
               },
               {
                  name: "bogofilter-dos(17916)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01",
            },
            {
               name: "bogofilter-dos(17916)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1007",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01",
                     refsource: "CONFIRM",
                     url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01",
                  },
                  {
                     name: "bogofilter-dos(17916)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1007",
      datePublished: "2004-11-04T05:00:00",
      dateReserved: "2004-11-03T00:00:00",
      dateUpdated: "2024-08-08T00:38:59.725Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0384 (GCVE-0-2005-0384)
Vulnerability from cvelistv5
Published
2005-03-18 05:00
Modified
2024-08-07 21:13
Severity ?
Summary
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.
References
http://secunia.com/advisories/20163third-party-advisory, x_refsource_SECUNIA
http://www.trustix.org/errata/2005/0009/vendor-advisory, x_refsource_TRUSTIX
http://www.debian.org/security/2006/dsa-1082vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2005-366.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/12810vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2005-283.htmlvendor-advisory, x_refsource_REDHAT
http://www.novell.com/linux/security/advisories/2005_18_kernel.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2006/dsa-1070vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2006/dsa-1067vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2006/dsa-1069vendor-advisory, x_refsource_DEBIAN
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532vendor-advisory, x_refsource_FEDORA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562vdb-entry, signature, x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2005-293.htmlvendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2005-284.htmlvendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/95-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/20202third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20338third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T21:13:53.709Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20163",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20163",
               },
               {
                  name: "2005-0009",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2005/0009/",
               },
               {
                  name: "DSA-1082",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1082",
               },
               {
                  name: "RHSA-2005:366",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
               },
               {
                  name: "12810",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/12810",
               },
               {
                  name: "RHSA-2005:283",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
               },
               {
                  name: "SUSE-SA:2005:018",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html",
               },
               {
                  name: "DSA-1070",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1070",
               },
               {
                  name: "DSA-1067",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1067",
               },
               {
                  name: "DSA-1069",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-1069",
               },
               {
                  name: "FLSA:152532",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
               },
               {
                  name: "oval:org.mitre.oval:def:9562",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562",
               },
               {
                  name: "RHSA-2005:293",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
               },
               {
                  name: "RHSA-2005:284",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
               },
               {
                  name: "USN-95-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/95-1/",
               },
               {
                  name: "20202",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20202",
               },
               {
                  name: "20338",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20338",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-03-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               name: "20163",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20163",
            },
            {
               name: "2005-0009",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2005/0009/",
            },
            {
               name: "DSA-1082",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1082",
            },
            {
               name: "RHSA-2005:366",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
            },
            {
               name: "12810",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/12810",
            },
            {
               name: "RHSA-2005:283",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
            },
            {
               name: "SUSE-SA:2005:018",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html",
            },
            {
               name: "DSA-1070",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1070",
            },
            {
               name: "DSA-1067",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1067",
            },
            {
               name: "DSA-1069",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-1069",
            },
            {
               name: "FLSA:152532",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
            },
            {
               name: "oval:org.mitre.oval:def:9562",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562",
            },
            {
               name: "RHSA-2005:293",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
            },
            {
               name: "RHSA-2005:284",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
            },
            {
               name: "USN-95-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/95-1/",
            },
            {
               name: "20202",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20202",
            },
            {
               name: "20338",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20338",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2005-0384",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20163",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20163",
                  },
                  {
                     name: "2005-0009",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2005/0009/",
                  },
                  {
                     name: "DSA-1082",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1082",
                  },
                  {
                     name: "RHSA-2005:366",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
                  },
                  {
                     name: "12810",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/12810",
                  },
                  {
                     name: "RHSA-2005:283",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
                  },
                  {
                     name: "SUSE-SA:2005:018",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html",
                  },
                  {
                     name: "DSA-1070",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1070",
                  },
                  {
                     name: "DSA-1067",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1067",
                  },
                  {
                     name: "DSA-1069",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-1069",
                  },
                  {
                     name: "FLSA:152532",
                     refsource: "FEDORA",
                     url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9562",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562",
                  },
                  {
                     name: "RHSA-2005:293",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
                  },
                  {
                     name: "RHSA-2005:284",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
                  },
                  {
                     name: "USN-95-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/95-1/",
                  },
                  {
                     name: "20202",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20202",
                  },
                  {
                     name: "20338",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20338",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2005-0384",
      datePublished: "2005-03-18T05:00:00",
      dateReserved: "2005-02-14T00:00:00",
      dateUpdated: "2024-08-07T21:13:53.709Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0882 (GCVE-0-2004-0882)
Vulnerability from cvelistv5
Published
2004-11-19 05:00
Modified
2024-08-08 00:31
Severity ?
Summary
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.
References
http://securitytracker.com/id?1012235vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=110055646329581&w=2mailing-list, x_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=110330519803655&w=2mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/18070vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/457622third-party-advisory, x_refsource_CERT-VN
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899vendor-advisory, x_refsource_CONECTIVA
http://secunia.com/advisories/13189third-party-advisory, x_refsource_SECUNIA
http://security.e-matters.de/advisories/132004.htmlx_refsource_MISC
http://marc.info/?l=bugtraq&m=110054671403755&w=2mailing-list, x_refsource_BUGTRAQ
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969vdb-entry, signature, x_refsource_OVAL
http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.trustix.net/errata/2004/0058/vendor-advisory, x_refsource_TRUSTIX
http://www.osvdb.org/11782vdb-entry, x_refsource_OSVDB
ftp://patches.sgi.com/support/free/security/advisories/20041201-01-Pvendor-advisory, x_refsource_SGI
http://www.ciac.org/ciac/bulletins/p-038.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.novell.com/linux/security/advisories/2004_40_samba.htmlvendor-advisory, x_refsource_SUSE
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txtvendor-advisory, x_refsource_SCO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:47.947Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1012235",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1012235",
               },
               {
                  name: "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2",
               },
               {
                  name: "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2",
               },
               {
                  name: "samba-qfilepathinfo-bo(18070)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070",
               },
               {
                  name: "VU#457622",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/457622",
               },
               {
                  name: "CLA-2004:899",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899",
               },
               {
                  name: "13189",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/13189",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://security.e-matters.de/advisories/132004.html",
               },
               {
                  name: "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2",
               },
               {
                  name: "oval:org.mitre.oval:def:9969",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969",
               },
               {
                  name: "APPLE-SA-2005-03-21",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html",
               },
               {
                  name: "2004-0058",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.net/errata/2004/0058/",
               },
               {
                  name: "11782",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/11782",
               },
               {
                  name: "20041201-01-P",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P",
               },
               {
                  name: "P-038",
                  tags: [
                     "third-party-advisory",
                     "government-resource",
                     "x_refsource_CIAC",
                     "x_transferred",
                  ],
                  url: "http://www.ciac.org/ciac/bulletins/p-038.shtml",
               },
               {
                  name: "SUSE-SA:2004:040",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html",
               },
               {
                  name: "SCOSA-2005.17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small \"maximum data bytes\" value.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1012235",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1012235",
            },
            {
               name: "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2",
            },
            {
               name: "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2",
            },
            {
               name: "samba-qfilepathinfo-bo(18070)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070",
            },
            {
               name: "VU#457622",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/457622",
            },
            {
               name: "CLA-2004:899",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899",
            },
            {
               name: "13189",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/13189",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://security.e-matters.de/advisories/132004.html",
            },
            {
               name: "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2",
            },
            {
               name: "oval:org.mitre.oval:def:9969",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969",
            },
            {
               name: "APPLE-SA-2005-03-21",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html",
            },
            {
               name: "2004-0058",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.net/errata/2004/0058/",
            },
            {
               name: "11782",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/11782",
            },
            {
               name: "20041201-01-P",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P",
            },
            {
               name: "P-038",
               tags: [
                  "third-party-advisory",
                  "government-resource",
                  "x_refsource_CIAC",
               ],
               url: "http://www.ciac.org/ciac/bulletins/p-038.shtml",
            },
            {
               name: "SUSE-SA:2004:040",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html",
            },
            {
               name: "SCOSA-2005.17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0882",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small \"maximum data bytes\" value.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1012235",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1012235",
                  },
                  {
                     name: "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2",
                  },
                  {
                     name: "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2",
                  },
                  {
                     name: "samba-qfilepathinfo-bo(18070)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070",
                  },
                  {
                     name: "VU#457622",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/457622",
                  },
                  {
                     name: "CLA-2004:899",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899",
                  },
                  {
                     name: "13189",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/13189",
                  },
                  {
                     name: "http://security.e-matters.de/advisories/132004.html",
                     refsource: "MISC",
                     url: "http://security.e-matters.de/advisories/132004.html",
                  },
                  {
                     name: "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9969",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969",
                  },
                  {
                     name: "APPLE-SA-2005-03-21",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html",
                  },
                  {
                     name: "2004-0058",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.net/errata/2004/0058/",
                  },
                  {
                     name: "11782",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/11782",
                  },
                  {
                     name: "20041201-01-P",
                     refsource: "SGI",
                     url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P",
                  },
                  {
                     name: "P-038",
                     refsource: "CIAC",
                     url: "http://www.ciac.org/ciac/bulletins/p-038.shtml",
                  },
                  {
                     name: "SUSE-SA:2004:040",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html",
                  },
                  {
                     name: "SCOSA-2005.17",
                     refsource: "SCO",
                     url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0882",
      datePublished: "2004-11-19T05:00:00",
      dateReserved: "2004-09-22T00:00:00",
      dateUpdated: "2024-08-08T00:31:47.947Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0750 (GCVE-0-2005-0750)
Vulnerability from cvelistv5
Published
2005-04-03 05:00
Modified
2024-08-07 21:21
Severity ?
Summary
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T21:21:06.748Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "kernel-bluezsockcreate-integer-underflow(19844)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19844",
               },
               {
                  name: "RHSA-2005:366",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
               },
               {
                  name: "RHSA-2005:283",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
               },
               {
                  name: "20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=111204562102633&w=2",
               },
               {
                  name: "oval:org.mitre.oval:def:11719",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719",
               },
               {
                  name: "12911",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/12911",
               },
               {
                  name: "FLSA:152532",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
               },
               {
                  name: "RHSA-2005:293",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
               },
               {
                  name: "RHSA-2005:284",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
               },
               {
                  name: "20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "kernel-bluezsockcreate-integer-underflow(19844)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19844",
            },
            {
               name: "RHSA-2005:366",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
            },
            {
               name: "RHSA-2005:283",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
            },
            {
               name: "20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=111204562102633&w=2",
            },
            {
               name: "oval:org.mitre.oval:def:11719",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719",
            },
            {
               name: "12911",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/12911",
            },
            {
               name: "FLSA:152532",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
            },
            {
               name: "RHSA-2005:293",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
            },
            {
               name: "RHSA-2005:284",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
            },
            {
               name: "20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2005-0750",
      datePublished: "2005-04-03T05:00:00",
      dateReserved: "2005-03-17T00:00:00",
      dateUpdated: "2024-08-07T21:21:06.748Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0918 (GCVE-0-2004-0918)
Vulnerability from cvelistv5
Published
2004-10-21 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
References
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923vendor-advisory, x_refsource_CONECTIVA
http://www.securityfocus.com/bid/11385vdb-entry, x_refsource_BID
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txtvendor-advisory, x_refsource_SCO
http://www.redhat.com/support/errata/RHSA-2004-591.htmlvendor-advisory, x_refsource_REDHAT
http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=falsethird-party-advisory, x_refsource_IDEFENSE
http://www.squid-cache.org/Advisories/SQUID-2004_3.txtx_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931vdb-entry, signature, x_refsource_OVAL
http://www.vupen.com/english/advisories/2008/1969/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/30967third-party-advisory, x_refsource_SECUNIA
http://fedoranews.org/updates/FEDORA--.shtmlvendor-advisory, x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.htmlvendor-advisory, x_refsource_SUSE
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.htmlvendor-advisory, x_refsource_FEDORA
http://marc.info/?l=bugtraq&m=109913064629327&w=2vendor-advisory, x_refsource_OPENPKG
https://exchange.xforce.ibmcloud.com/vulnerabilities/17688vdb-entry, x_refsource_XF
http://secunia.com/advisories/30914third-party-advisory, x_refsource_SECUNIA
http://www.squid-cache.org/Advisories/SQUID-2008_1.txtx_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200410-15.xmlvendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:48.079Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "CLA-2005:923",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923",
               },
               {
                  name: "11385",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11385",
               },
               {
                  name: "SCOSA-2005.16",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SCO",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt",
               },
               {
                  name: "RHSA-2004:591",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2004-591.html",
               },
               {
                  name: "20041011 Squid Web Proxy Cache Remote Denial of Service Vulnerability",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_IDEFENSE",
                     "x_transferred",
                  ],
                  url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt",
               },
               {
                  name: "oval:org.mitre.oval:def:10931",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931",
               },
               {
                  name: "ADV-2008-1969",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1969/references",
               },
               {
                  name: "30967",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30967",
               },
               {
                  name: "FLSA-2006:152809",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://fedoranews.org/updates/FEDORA--.shtml",
               },
               {
                  name: "SUSE-SR:2008:014",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
               },
               {
                  name: "FEDORA-2008-6045",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html",
               },
               {
                  name: "OpenPKG-SA-2004.048",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENPKG",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2",
               },
               {
                  name: "squid-snmp-asnparseheader-dos(17688)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688",
               },
               {
                  name: "30914",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30914",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt",
               },
               {
                  name: "GLSA-200410-15",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "CLA-2005:923",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923",
            },
            {
               name: "11385",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11385",
            },
            {
               name: "SCOSA-2005.16",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SCO",
               ],
               url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt",
            },
            {
               name: "RHSA-2004:591",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2004-591.html",
            },
            {
               name: "20041011 Squid Web Proxy Cache Remote Denial of Service Vulnerability",
               tags: [
                  "third-party-advisory",
                  "x_refsource_IDEFENSE",
               ],
               url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt",
            },
            {
               name: "oval:org.mitre.oval:def:10931",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931",
            },
            {
               name: "ADV-2008-1969",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1969/references",
            },
            {
               name: "30967",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30967",
            },
            {
               name: "FLSA-2006:152809",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://fedoranews.org/updates/FEDORA--.shtml",
            },
            {
               name: "SUSE-SR:2008:014",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
            },
            {
               name: "FEDORA-2008-6045",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html",
            },
            {
               name: "OpenPKG-SA-2004.048",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENPKG",
               ],
               url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2",
            },
            {
               name: "squid-snmp-asnparseheader-dos(17688)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688",
            },
            {
               name: "30914",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30914",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt",
            },
            {
               name: "GLSA-200410-15",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0918",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "CLA-2005:923",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923",
                  },
                  {
                     name: "11385",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11385",
                  },
                  {
                     name: "SCOSA-2005.16",
                     refsource: "SCO",
                     url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt",
                  },
                  {
                     name: "RHSA-2004:591",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2004-591.html",
                  },
                  {
                     name: "20041011 Squid Web Proxy Cache Remote Denial of Service Vulnerability",
                     refsource: "IDEFENSE",
                     url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false",
                  },
                  {
                     name: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt",
                     refsource: "CONFIRM",
                     url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10931",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931",
                  },
                  {
                     name: "ADV-2008-1969",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1969/references",
                  },
                  {
                     name: "30967",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30967",
                  },
                  {
                     name: "FLSA-2006:152809",
                     refsource: "FEDORA",
                     url: "http://fedoranews.org/updates/FEDORA--.shtml",
                  },
                  {
                     name: "SUSE-SR:2008:014",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
                  },
                  {
                     name: "FEDORA-2008-6045",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html",
                  },
                  {
                     name: "OpenPKG-SA-2004.048",
                     refsource: "OPENPKG",
                     url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2",
                  },
                  {
                     name: "squid-snmp-asnparseheader-dos(17688)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688",
                  },
                  {
                     name: "30914",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30914",
                  },
                  {
                     name: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt",
                     refsource: "CONFIRM",
                     url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt",
                  },
                  {
                     name: "GLSA-200410-15",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0918",
      datePublished: "2004-10-21T04:00:00",
      dateReserved: "2004-09-27T00:00:00",
      dateUpdated: "2024-08-08T00:31:48.079Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1051 (GCVE-0-2004-1051)
Vulnerability from cvelistv5
Published
2004-11-18 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
References
https://www.ubuntu.com/usn/usn-28-1/vendor-advisory, x_refsource_UBUNTU
http://www.sudo.ws/sudo/alerts/bash_functions.htmlx_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=110598298225675&w=2vendor-advisory, x_refsource_OPENPKG
http://marc.info/?l=bugtraq&m=110028877431192&w=2mailing-list, x_refsource_BUGTRAQ
http://www.mandriva.com/security/advisories?name=MDKSA-2004:133vendor-advisory, x_refsource_MANDRAKE
http://lists.apple.com/archives/security-announce/2005/May/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://www.securityfocus.com/bid/11668vdb-entry, x_refsource_BID
http://www.debian.org/security/2004/dsa-596vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/18055vdb-entry, x_refsource_XF
http://www.trustix.org/errata/2004/0061/vendor-advisory, x_refsource_TRUSTIX
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:39:00.761Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-28-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://www.ubuntu.com/usn/usn-28-1/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.sudo.ws/sudo/alerts/bash_functions.html",
               },
               {
                  name: "OpenPKG-SA-2005.002",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_OPENPKG",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2",
               },
               {
                  name: "20041112 Sudo version 1.6.8p2 now available (fwd)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2",
               },
               {
                  name: "MDKSA-2004:133",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133",
               },
               {
                  name: "APPLE-SA-2005-05-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html",
               },
               {
                  name: "11668",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/11668",
               },
               {
                  name: "DSA-596",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2004/dsa-596",
               },
               {
                  name: "sudo-bash-command-execution(18055)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055",
               },
               {
                  name: "2004-0061",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2004/0061/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-11-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "sudo before 1.6.8p2 allows local users to execute arbitrary commands by using \"()\" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "USN-28-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://www.ubuntu.com/usn/usn-28-1/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.sudo.ws/sudo/alerts/bash_functions.html",
            },
            {
               name: "OpenPKG-SA-2005.002",
               tags: [
                  "vendor-advisory",
                  "x_refsource_OPENPKG",
               ],
               url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2",
            },
            {
               name: "20041112 Sudo version 1.6.8p2 now available (fwd)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2",
            },
            {
               name: "MDKSA-2004:133",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133",
            },
            {
               name: "APPLE-SA-2005-05-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html",
            },
            {
               name: "11668",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/11668",
            },
            {
               name: "DSA-596",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2004/dsa-596",
            },
            {
               name: "sudo-bash-command-execution(18055)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055",
            },
            {
               name: "2004-0061",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2004/0061/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1051",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "sudo before 1.6.8p2 allows local users to execute arbitrary commands by using \"()\" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-28-1",
                     refsource: "UBUNTU",
                     url: "https://www.ubuntu.com/usn/usn-28-1/",
                  },
                  {
                     name: "http://www.sudo.ws/sudo/alerts/bash_functions.html",
                     refsource: "CONFIRM",
                     url: "http://www.sudo.ws/sudo/alerts/bash_functions.html",
                  },
                  {
                     name: "OpenPKG-SA-2005.002",
                     refsource: "OPENPKG",
                     url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2",
                  },
                  {
                     name: "20041112 Sudo version 1.6.8p2 now available (fwd)",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2",
                  },
                  {
                     name: "MDKSA-2004:133",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133",
                  },
                  {
                     name: "APPLE-SA-2005-05-03",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html",
                  },
                  {
                     name: "11668",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/11668",
                  },
                  {
                     name: "DSA-596",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2004/dsa-596",
                  },
                  {
                     name: "sudo-bash-command-execution(18055)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055",
                  },
                  {
                     name: "2004-0061",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2004/0061/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1051",
      datePublished: "2004-11-18T05:00:00",
      dateReserved: "2004-11-17T00:00:00",
      dateUpdated: "2024-08-08T00:39:00.761Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-0156 (GCVE-0-2005-0156)
Vulnerability from cvelistv5
Published
2005-02-07 05:00
Modified
2024-08-07 21:05
Severity ?
Summary
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
References
http://marc.info/?l=full-disclosure&m=110779721503111&w=2mailing-list, x_refsource_FULLDISC
http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txtx_refsource_MISC
http://www.securityfocus.com/bid/12426vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2005-105.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/14120third-party-advisory, x_refsource_SECUNIA
http://www.trustix.org/errata/2005/0003/vendor-advisory, x_refsource_TRUSTIX
http://www.redhat.com/support/errata/RHSA-2005-103.htmlvendor-advisory, x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/55314third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=110737149402683&w=2mailing-list, x_refsource_BUGTRAQ
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056vendor-advisory, x_refsource_CONECTIVA
http://fedoranews.org/updates/FEDORA--.shtmlvendor-advisory, x_refsource_FEDORA
http://www.mandriva.com/security/advisories?name=MDKSA-2005:031vendor-advisory, x_refsource_MANDRAKE
https://exchange.xforce.ibmcloud.com/vulnerabilities/19208vdb-entry, x_refsource_XF
http://www.gentoo.org/security/en/glsa/glsa-200502-13.xmlvendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T21:05:24.911Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20050207 DMA[2005-0131b] - 'Setuid Perl PERLIO_DEBUG",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt",
               },
               {
                  name: "12426",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/12426",
               },
               {
                  name: "RHSA-2005:105",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-105.html",
               },
               {
                  name: "14120",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/14120",
               },
               {
                  name: "2005-0003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2005/0003/",
               },
               {
                  name: "RHSA-2005:103",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2005-103.html",
               },
               {
                  name: "oval:org.mitre.oval:def:10803",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803",
               },
               {
                  name: "55314",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/55314",
               },
               {
                  name: "20050202 [USN-72-1] Perl vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2",
               },
               {
                  name: "CLSA-2006:1056",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056",
               },
               {
                  name: "FLSA-2006:152845",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://fedoranews.org/updates/FEDORA--.shtml",
               },
               {
                  name: "MDKSA-2005:031",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031",
               },
               {
                  name: "perl-perliodebug-bo(19208)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208",
               },
               {
                  name: "GLSA-200502-13",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-02-02T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20050207 DMA[2005-0131b] - 'Setuid Perl PERLIO_DEBUG",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt",
            },
            {
               name: "12426",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/12426",
            },
            {
               name: "RHSA-2005:105",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-105.html",
            },
            {
               name: "14120",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/14120",
            },
            {
               name: "2005-0003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2005/0003/",
            },
            {
               name: "RHSA-2005:103",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2005-103.html",
            },
            {
               name: "oval:org.mitre.oval:def:10803",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803",
            },
            {
               name: "55314",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/55314",
            },
            {
               name: "20050202 [USN-72-1] Perl vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2",
            },
            {
               name: "CLSA-2006:1056",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056",
            },
            {
               name: "FLSA-2006:152845",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://fedoranews.org/updates/FEDORA--.shtml",
            },
            {
               name: "MDKSA-2005:031",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031",
            },
            {
               name: "perl-perliodebug-bo(19208)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208",
            },
            {
               name: "GLSA-200502-13",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-0156",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20050207 DMA[2005-0131b] - 'Setuid Perl PERLIO_DEBUG",
                     refsource: "FULLDISC",
                     url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2",
                  },
                  {
                     name: "http://www.digitalmunition.com/DMA[2005-0131b].txt",
                     refsource: "MISC",
                     url: "http://www.digitalmunition.com/DMA[2005-0131b].txt",
                  },
                  {
                     name: "12426",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/12426",
                  },
                  {
                     name: "RHSA-2005:105",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-105.html",
                  },
                  {
                     name: "14120",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/14120",
                  },
                  {
                     name: "2005-0003",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2005/0003/",
                  },
                  {
                     name: "RHSA-2005:103",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2005-103.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10803",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803",
                  },
                  {
                     name: "55314",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/55314",
                  },
                  {
                     name: "20050202 [USN-72-1] Perl vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2",
                  },
                  {
                     name: "CLSA-2006:1056",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056",
                  },
                  {
                     name: "FLSA-2006:152845",
                     refsource: "FEDORA",
                     url: "http://fedoranews.org/updates/FEDORA--.shtml",
                  },
                  {
                     name: "MDKSA-2005:031",
                     refsource: "MANDRAKE",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031",
                  },
                  {
                     name: "perl-perliodebug-bo(19208)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208",
                  },
                  {
                     name: "GLSA-200502-13",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-0156",
      datePublished: "2005-02-07T05:00:00",
      dateReserved: "2005-01-27T00:00:00",
      dateUpdated: "2024-08-07T21:05:24.911Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2008-0172 (GCVE-0-2008-0172)
Vulnerability from cvelistv5
Published
2008-01-17 22:00
Modified
2024-08-07 07:39
Severity ?
Summary
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
References
http://wiki.rpath.com/Advisories:rPSA-2008-0063x_refsource_CONFIRM
http://secunia.com/advisories/48099third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0249vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/27325vdb-entry, x_refsource_BID
http://secunia.com/advisories/28860third-party-advisory, x_refsource_SECUNIA
http://svn.boost.org/trac/boost/changeset/42745x_refsource_CONFIRM
http://secunia.com/advisories/28943third-party-advisory, x_refsource_SECUNIA
http://svn.boost.org/trac/boost/changeset/42674x_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-2143x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/28511third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/488102/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/28705third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28545third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.htmlvendor-advisory, x_refsource_SUSE
http://www.gentoo.org/security/en/glsa/glsa-200802-08.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/28527third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-570-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/29323third-party-advisory, x_refsource_SECUNIA
http://bugs.gentoo.org/show_bug.cgi?id=205955x_refsource_CONFIRM
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T07:39:32.901Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
               },
               {
                  name: "48099",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/48099",
               },
               {
                  name: "ADV-2008-0249",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/0249",
               },
               {
                  name: "27325",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/27325",
               },
               {
                  name: "28860",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28860",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://svn.boost.org/trac/boost/changeset/42745",
               },
               {
                  name: "28943",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28943",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://svn.boost.org/trac/boost/changeset/42674",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.rpath.com/browse/RPL-2143",
               },
               {
                  name: "FEDORA-2008-0880",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html",
               },
               {
                  name: "28511",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28511",
               },
               {
                  name: "20080213 rPSA-2008-0063-1 boost",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded",
               },
               {
                  name: "28705",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28705",
               },
               {
                  name: "28545",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28545",
               },
               {
                  name: "SUSE-SR:2008:006",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html",
               },
               {
                  name: "GLSA-200802-08",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml",
               },
               {
                  name: "28527",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28527",
               },
               {
                  name: "USN-570-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-570-1",
               },
               {
                  name: "29323",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/29323",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.gentoo.org/show_bug.cgi?id=205955",
               },
               {
                  name: "MDVSA-2008:032",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2008-01-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-15T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
            },
            {
               name: "48099",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/48099",
            },
            {
               name: "ADV-2008-0249",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/0249",
            },
            {
               name: "27325",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/27325",
            },
            {
               name: "28860",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28860",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://svn.boost.org/trac/boost/changeset/42745",
            },
            {
               name: "28943",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28943",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://svn.boost.org/trac/boost/changeset/42674",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.rpath.com/browse/RPL-2143",
            },
            {
               name: "FEDORA-2008-0880",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html",
            },
            {
               name: "28511",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28511",
            },
            {
               name: "20080213 rPSA-2008-0063-1 boost",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded",
            },
            {
               name: "28705",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28705",
            },
            {
               name: "28545",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28545",
            },
            {
               name: "SUSE-SR:2008:006",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html",
            },
            {
               name: "GLSA-200802-08",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml",
            },
            {
               name: "28527",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28527",
            },
            {
               name: "USN-570-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-570-1",
            },
            {
               name: "29323",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/29323",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.gentoo.org/show_bug.cgi?id=205955",
            },
            {
               name: "MDVSA-2008:032",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2008-0172",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
                     refsource: "CONFIRM",
                     url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
                  },
                  {
                     name: "48099",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/48099",
                  },
                  {
                     name: "ADV-2008-0249",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/0249",
                  },
                  {
                     name: "27325",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/27325",
                  },
                  {
                     name: "28860",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28860",
                  },
                  {
                     name: "http://svn.boost.org/trac/boost/changeset/42745",
                     refsource: "CONFIRM",
                     url: "http://svn.boost.org/trac/boost/changeset/42745",
                  },
                  {
                     name: "28943",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28943",
                  },
                  {
                     name: "http://svn.boost.org/trac/boost/changeset/42674",
                     refsource: "CONFIRM",
                     url: "http://svn.boost.org/trac/boost/changeset/42674",
                  },
                  {
                     name: "https://issues.rpath.com/browse/RPL-2143",
                     refsource: "CONFIRM",
                     url: "https://issues.rpath.com/browse/RPL-2143",
                  },
                  {
                     name: "FEDORA-2008-0880",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html",
                  },
                  {
                     name: "28511",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28511",
                  },
                  {
                     name: "20080213 rPSA-2008-0063-1 boost",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded",
                  },
                  {
                     name: "28705",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28705",
                  },
                  {
                     name: "28545",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28545",
                  },
                  {
                     name: "SUSE-SR:2008:006",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html",
                  },
                  {
                     name: "GLSA-200802-08",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml",
                  },
                  {
                     name: "28527",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28527",
                  },
                  {
                     name: "USN-570-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-570-1",
                  },
                  {
                     name: "29323",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/29323",
                  },
                  {
                     name: "http://bugs.gentoo.org/show_bug.cgi?id=205955",
                     refsource: "CONFIRM",
                     url: "http://bugs.gentoo.org/show_bug.cgi?id=205955",
                  },
                  {
                     name: "MDVSA-2008:032",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2008-0172",
      datePublished: "2008-01-17T22:00:00",
      dateReserved: "2008-01-09T00:00:00",
      dateUpdated: "2024-08-07T07:39:32.901Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0956 (GCVE-0-2004-0956)
Vulnerability from cvelistv5
Published
2004-12-05 05:00
Modified
2024-08-08 00:31
Severity ?
Summary
MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:31:48.208Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "2004-0054",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.net/errata/2004/0054/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://lists.mysql.com/packagers/202",
               },
               {
                  name: "GLSA-200410-22",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml",
               },
               {
                  name: "mysql-match-against-dos(17768)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768",
               },
               {
                  name: "SUSE-SR:2004:001",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.mysql.com/bug.php?id=3870",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "2004-0054",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.net/errata/2004/0054/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://lists.mysql.com/packagers/202",
            },
            {
               name: "GLSA-200410-22",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml",
            },
            {
               name: "mysql-match-against-dos(17768)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768",
            },
            {
               name: "SUSE-SR:2004:001",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.mysql.com/bug.php?id=3870",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0956",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "2004-0054",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.net/errata/2004/0054/",
                  },
                  {
                     name: "http://lists.mysql.com/packagers/202",
                     refsource: "CONFIRM",
                     url: "http://lists.mysql.com/packagers/202",
                  },
                  {
                     name: "GLSA-200410-22",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml",
                  },
                  {
                     name: "mysql-match-against-dos(17768)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768",
                  },
                  {
                     name: "SUSE-SR:2004:001",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html",
                  },
                  {
                     name: "http://bugs.mysql.com/bug.php?id=3870",
                     refsource: "CONFIRM",
                     url: "http://bugs.mysql.com/bug.php?id=3870",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0956",
      datePublished: "2004-12-05T05:00:00",
      dateReserved: "2004-10-13T00:00:00",
      dateUpdated: "2024-08-08T00:31:48.208Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110314318531298&w=2
cve@mitre.orghttp://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
cve@mitre.orghttp://www.hardened-php.net/advisories/012004.txt
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:151
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
cve@mitre.orghttp://www.php.net/release_4_3_10.php
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-687.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-032.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-816.html
cve@mitre.orghttp://www.securityfocus.com/advisories/9028
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2344
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18514
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110314318531298&w=2
af854a3a-2127-422b-91ae-364da2661108http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
af854a3a-2127-422b-91ae-364da2661108http://www.hardened-php.net/advisories/012004.txt
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:151
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/release_4_3_10.php
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-687.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-032.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-816.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/9028
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2344
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18514
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511
Impacted products
Vendor Product Version
openpkg openpkg 2.1
openpkg openpkg 2.2
openpkg openpkg current
php php 3.0
php php 3.0.1
php php 3.0.2
php php 3.0.3
php php 3.0.4
php php 3.0.5
php php 3.0.6
php php 3.0.7
php php 3.0.8
php php 3.0.9
php php 3.0.10
php php 3.0.11
php php 3.0.12
php php 3.0.13
php php 3.0.14
php php 3.0.15
php php 3.0.16
php php 3.0.17
php php 3.0.18
php php 4.0
php php 4.0.1
php php 4.0.1
php php 4.0.1
php php 4.0.2
php php 4.0.3
php php 4.0.3
php php 4.0.4
php php 4.0.5
php php 4.0.6
php php 4.0.7
php php 4.0.7
php php 4.0.7
php php 4.0.7
php php 4.1.0
php php 4.1.1
php php 4.1.2
php php 4.2
php php 4.2.0
php php 4.2.1
php php 4.2.2
php php 4.2.3
php php 4.3.0
php php 4.3.1
php php 4.3.2
php php 4.3.3
php php 4.3.4
php php 4.3.5
php php 4.3.6
php php 4.3.7
php php 4.3.8
php php 4.3.9
php php 5.0
php php 5.0
php php 5.0
php php 5.0.0
php php 5.0.1
php php 5.0.2
trustix secure_linux 2.0
trustix secure_linux 2.1
trustix secure_linux 2.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "37042CDE-E4FE-442E-891A-CD84433D36E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F6E348-01DF-4FA4-808E-39A2A7A2B97B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "245C601D-0FE7-47E3-8304-6FF45E9567D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "691BB8BB-329A-4640-B758-7590C99B5E42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2BC4CCE-2774-463E-82EA-36CD442D3A7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C478024C-2FCD-463F-A75E-E04660AA9DF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5BD99C0-E875-496E-BE5E-A8DCBD414B5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1851ADE5-C70C-46E0-941A-6ADF7DB5C126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "69DA3BA2-AF53-4C9D-93FA-0317841595B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "67B59D6A-7EDA-4C34-81D6-C2557C85D164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEBA40B6-8FDF-41AA-8166-F491FF7F3118",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "E74E2B72-A428-4BB3-B6F8-0AF5E487A807",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "945FF149-3446-4905-BCA1-C397E3497B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E446DBD-FEFA-4D22-9C9D-51F61C01E414",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C8DE728-78E1-4F9F-BC56-CD9B10E61287",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E31CC6-9356-4BB7-9F49-320AAF341E1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB8AD3A-9181-459A-9AF2-B3FC6BAF6FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3E7199-8FB7-4930-9C0A-A36A698940B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDBEC461-D553-41B7-8D85-20B6A933C21C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "78BAA18C-E5A0-4210-B64B-709BBFF31EEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
                     matchCriteriaId: "419867C6-37BE-43B4-BFE0-6325FEE3807D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
                     matchCriteriaId: "37896E87-95C2-4039-8362-BC03B1C56706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "13A159B4-B847-47DE-B7F8-89384E6C551B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B59616-A309-40B4-94B1-50A7BC00E35C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
                     matchCriteriaId: "8667FBC6-04B6-40E5-93B3-6C22BEED4B26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39A1B1-416E-4436-8007-733B66904A14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2E5F96-66D2-4F99-A74D-6A2305EE218E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D724D09-0D45-4701-93C9-348301217C8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "FC6A6F47-5C7C-4F82-B23B-9C959C69B27F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "6E36203C-1392-49BB-AE7E-49626963D673",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6713614A-B14E-4A85-BF89-ED780068FC68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD95F8EB-B428-4B3C-9254-A5DECE03A989",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "069EB7EE-06B9-454F-9007-8DE5DCA33C53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
                     matchCriteriaId: "BBA861A2-F0CD-4DBB-B43A-4970EB114DA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "18BF5BE6-09EA-45AD-93BF-2BEF1742534E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC1460DF-1687-4314-BF1A-01290B20302D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "470380B0-3982-48FC-871B-C8B43C81900D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "63190D9B-7958-4B93-87C6-E7D5A572F6DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AAF4586-74FF-47C6-864B-656FDF3F33D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5245F990-B4A7-4ED8-909D-B8137CE79FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "5652D5B0-68E4-4239-B9B7-599AFCF4C53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B71BB7-5239-4860-9100-8CABC3992D8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BD447A-4EED-482C-8F61-48FAD4FCF8BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F9DF9D-15E5-4387-ABE3-A7583331A928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "11579E5C-D7CF-46EE-B015-5F4185C174E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "E3797AB5-9E49-4251-A212-B6E5D9996764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7007E77F-60EF-44D8-9676-15B59DF1325F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "74E7AE59-1CB0-4300-BBE0-109F909789EF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger \"information disclosure, double-free and negative reference index array underflow\" results.",
      },
      {
         lang: "es",
         value: "El código de deserialización en PHP anteriores a 4.3.10 y PHP 5.x hasta 5.0.2 permite a atacantes remotos causar una denegación de servicio y ejecutar código de su elección mediante datos \"no de confianza\" a la función unserialize que pueden producir resultados de \"revelación de información, liberación de memoria doble y referencia a índice de arrray negativo\"",
      },
   ],
   id: "CVE-2004-1019",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.hardened-php.net/advisories/012004.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.php.net/release_4_3_10.php",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-816.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/advisories/9028",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.hardened-php.net/advisories/012004.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.php.net/release_4_3_10.php",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-816.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/advisories/9028",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.
References
cve@mitre.orghttp://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:151
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
cve@mitre.orghttp://www.php.net/release_4_3_10.php
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-687.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-032.html
cve@mitre.orghttp://www.securityfocus.com/advisories/9028
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2344
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18517
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877
af854a3a-2127-422b-91ae-364da2661108http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:151
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/release_4_3_10.php
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-687.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-032.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/9028
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2344
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18517
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877
Impacted products
Vendor Product Version
openpkg openpkg 2.1
openpkg openpkg 2.2
openpkg openpkg current
php php 3.0
php php 3.0.1
php php 3.0.2
php php 3.0.3
php php 3.0.4
php php 3.0.5
php php 3.0.6
php php 3.0.7
php php 3.0.8
php php 3.0.9
php php 3.0.10
php php 3.0.11
php php 3.0.12
php php 3.0.13
php php 3.0.14
php php 3.0.15
php php 3.0.16
php php 3.0.17
php php 3.0.18
php php 4.0
php php 4.0.1
php php 4.0.1
php php 4.0.1
php php 4.0.2
php php 4.0.3
php php 4.0.3
php php 4.0.4
php php 4.0.5
php php 4.0.6
php php 4.0.7
php php 4.0.7
php php 4.0.7
php php 4.0.7
php php 4.1.0
php php 4.1.1
php php 4.1.2
php php 4.2
php php 4.2.0
php php 4.2.1
php php 4.2.2
php php 4.2.3
php php 4.3.0
php php 4.3.1
php php 4.3.2
php php 4.3.3
php php 4.3.4
php php 4.3.5
php php 4.3.6
php php 4.3.7
php php 4.3.8
php php 4.3.9
php php 5.0
php php 5.0
php php 5.0
php php 5.0.0
php php 5.0.1
php php 5.0.2
trustix secure_linux 2.0
trustix secure_linux 2.1
trustix secure_linux 2.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "37042CDE-E4FE-442E-891A-CD84433D36E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F6E348-01DF-4FA4-808E-39A2A7A2B97B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "245C601D-0FE7-47E3-8304-6FF45E9567D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "691BB8BB-329A-4640-B758-7590C99B5E42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2BC4CCE-2774-463E-82EA-36CD442D3A7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C478024C-2FCD-463F-A75E-E04660AA9DF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5BD99C0-E875-496E-BE5E-A8DCBD414B5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1851ADE5-C70C-46E0-941A-6ADF7DB5C126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "69DA3BA2-AF53-4C9D-93FA-0317841595B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "67B59D6A-7EDA-4C34-81D6-C2557C85D164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEBA40B6-8FDF-41AA-8166-F491FF7F3118",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "E74E2B72-A428-4BB3-B6F8-0AF5E487A807",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "945FF149-3446-4905-BCA1-C397E3497B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E446DBD-FEFA-4D22-9C9D-51F61C01E414",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C8DE728-78E1-4F9F-BC56-CD9B10E61287",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E31CC6-9356-4BB7-9F49-320AAF341E1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB8AD3A-9181-459A-9AF2-B3FC6BAF6FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3E7199-8FB7-4930-9C0A-A36A698940B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDBEC461-D553-41B7-8D85-20B6A933C21C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "78BAA18C-E5A0-4210-B64B-709BBFF31EEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
                     matchCriteriaId: "419867C6-37BE-43B4-BFE0-6325FEE3807D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
                     matchCriteriaId: "37896E87-95C2-4039-8362-BC03B1C56706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "13A159B4-B847-47DE-B7F8-89384E6C551B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B59616-A309-40B4-94B1-50A7BC00E35C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
                     matchCriteriaId: "8667FBC6-04B6-40E5-93B3-6C22BEED4B26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F39A1B1-416E-4436-8007-733B66904A14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2E5F96-66D2-4F99-A74D-6A2305EE218E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D724D09-0D45-4701-93C9-348301217C8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "FC6A6F47-5C7C-4F82-B23B-9C959C69B27F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "6E36203C-1392-49BB-AE7E-49626963D673",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6713614A-B14E-4A85-BF89-ED780068FC68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD95F8EB-B428-4B3C-9254-A5DECE03A989",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "069EB7EE-06B9-454F-9007-8DE5DCA33C53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
                     matchCriteriaId: "BBA861A2-F0CD-4DBB-B43A-4970EB114DA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "18BF5BE6-09EA-45AD-93BF-2BEF1742534E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC1460DF-1687-4314-BF1A-01290B20302D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "470380B0-3982-48FC-871B-C8B43C81900D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "63190D9B-7958-4B93-87C6-E7D5A572F6DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AAF4586-74FF-47C6-864B-656FDF3F33D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5245F990-B4A7-4ED8-909D-B8137CE79FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "5652D5B0-68E4-4239-B9B7-599AFCF4C53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B71BB7-5239-4860-9100-8CABC3992D8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BD447A-4EED-482C-8F61-48FAD4FCF8BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F9DF9D-15E5-4387-ABE3-A7583331A928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "11579E5C-D7CF-46EE-B015-5F4185C174E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "E3797AB5-9E49-4251-A212-B6E5D9996764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7007E77F-60EF-44D8-9676-15B59DF1325F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "74E7AE59-1CB0-4300-BBE0-109F909789EF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en la función exif_read_data de PHP anteriores a 4.3.10 y PHP 5.x hasta 5.0.2 permite a atacantes remotos ejecutar código arbitrario mediante un nombre de sección largo en un fichero de imagen.",
      },
   ],
   id: "CVE-2004-1065",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.php.net/release_4_3_10.php",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/advisories/9028",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.php.net/release_4_3_10.php",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-687.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-032.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/advisories/9028",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2009-03-05 02:30
Modified
2025-04-09 00:30
Severity ?
Summary
GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
secalert@redhat.comhttp://secunia.com/advisories/34067
secalert@redhat.comhttp://secunia.com/advisories/34473
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-0361.html
secalert@redhat.comhttp://www.securityfocus.com/bid/33966
secalert@redhat.comhttp://www.securitytracker.com/id?1021909
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-727-1Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=487752
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49063
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34067
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34473
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-0361.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/33966
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021909
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-727-1Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=487752
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49063
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 8.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED67B852-4B37-4B79-8F4D-23B2FEACA4ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.",
      },
      {
         lang: "es",
         value: "network-manager-applet en Ubuntu 8.10 no verifica adecuadamente los privilegios para las peticiones dbus(1) \"modify\" y (2) \"delete\", lo que permite a usuarios locales modificar o eliminar las conexiones de red de usuarios de su elección a través de vectores no especificados.",
      },
   ],
   id: "CVE-2009-0578",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.2,
               confidentialityImpact: "NONE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:S/C:N/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.1,
            impactScore: 9.2,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2009-03-05T02:30:00.343",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/34067",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/34473",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/33966",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securitytracker.com/id?1021909",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-727-1",
      },
      {
         source: "secalert@redhat.com",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49063",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/34067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/34473",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/33966",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1021909",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-727-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49063",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-12-14 00:28
Modified
2025-04-09 00:30
Summary
Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE3B4BE-7B43-47C7-823A-C019DF12498F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unspecified vulnerability in the \"alignment check exception handling\" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad sin especificar en el \"manejador de excepciones del check de alineamiento\" en el Ubuntu 5.10, 6.06 LTS, y 6.10 para el PowerPC (PPC) permite a usuarios locales provocar una denegación de servicio (kernel panic) mediante vectores sin especificar.",
      },
   ],
   id: "CVE-2006-5649",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 4.6,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:S/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.1,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2006-12-14T00:28:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23361",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23370",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23384",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23395",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23474",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/21523",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-395-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.us.debian.org/security/2006/dsa-1233",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.us.debian.org/security/2006/dsa-1237",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23361",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23370",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23384",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23395",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23474",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/21523",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-395-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.us.debian.org/security/2006/dsa-1233",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.us.debian.org/security/2006/dsa-1237",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Not vulnerable. This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, or 5.  Red Hat Enterprise Linux 2.1 did not ship for PowerPC architecture.",
         lastModified: "2007-06-10T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.
Impacted products
Vendor Product Version
gnu mailman 2.1.5
ubuntu ubuntu_linux 4.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C53260-503F-4934-B1FE-9FACD8E0EE66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C62EF915-CA7C-4D75-BC67-E015772BB9CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.",
      },
   ],
   id: "CVE-2005-0080",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-05-02T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://qa.debian.org/bts-security.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://qa.debian.org/bts-security.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-07-18 15:37
Modified
2025-04-03 01:03
Severity ?
Summary
passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the "Go Back" option after the final "Installation complete" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 6.06_lts



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the \"Go Back\" option after the final \"Installation complete\" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.",
      },
      {
         lang: "es",
         value: "passwd anterior a 1:4.0.13 sobre Ubuntu 6.06 LTS deja la contraseña de root en blanco en vez de cerrarlo cuando el administrador selecciona la opción \"Go Back\" después del mensaje final \"instalación completa\" y utiliza el menu principal, lo que provoca que la contraseña que se ponga a cero fuera de la memoria del instalador.",
      },
   ],
   id: "CVE-2006-3597",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-07-18T15:37:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/21022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/27091",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-316-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/21022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/27091",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-316-1",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
Impacted products
Vendor Product Version
gnu groff 1.19
gentoo linux *
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gnu:groff:1.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C3A17D1-F3A9-45FC-A943-C47B8121599C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
      },
   ],
   id: "CVE-2004-0969",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-02-09T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18764",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11287",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2004/0050",
      },
      {
         source: "cve@mitre.org",
         url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18764",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11287",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2004/0050",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE9BA9-DE82-4461-8D05-8B4DA2BAFE19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9313467-150B-4231-80E5-35EFD6B64978",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "05A4185F-1CE1-48D1-B967-01A96527417B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "551CCA30-00E2-46CF-A05B-FA8F9827CDF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.2_pre1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AF152DC-D5B5-4692-AA7F-38357A2C48B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.2_pre2:*:*:*:*:*:*:*",
                     matchCriteriaId: "724A539F-F54A-4896-9116-89D35350670D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "9E661D58-18DF-4CCF-9892-F873618F4535",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.",
      },
   ],
   id: "CVE-2004-0983",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-03-01T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2004/dsa-586",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-635.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11618",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268",
      },
      {
         source: "cve@mitre.org",
         url: "https://usn.ubuntu.com/20-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2004/dsa-586",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-635.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11618",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/20-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
References
secalert@redhat.comftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
secalert@redhat.comhttp://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2006-0177.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://scary.beasts.org/security/CESA-2005-003.txtExploit
secalert@redhat.comhttp://secunia.com/advisories/18147
secalert@redhat.comhttp://secunia.com/advisories/18303Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18312Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18313Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18329Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18332Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18334Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18335Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18338Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18349Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18373
secalert@redhat.comhttp://secunia.com/advisories/18375Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18380
secalert@redhat.comhttp://secunia.com/advisories/18385Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18387Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18389Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18398Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18407Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18414
secalert@redhat.comhttp://secunia.com/advisories/18416Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18423Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18425
secalert@redhat.comhttp://secunia.com/advisories/18428
secalert@redhat.comhttp://secunia.com/advisories/18436
secalert@redhat.comhttp://secunia.com/advisories/18448Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18463
secalert@redhat.comhttp://secunia.com/advisories/18517Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18534Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18554Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18582Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18642Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18644Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18674Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18675Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18679Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18908
secalert@redhat.comhttp://secunia.com/advisories/18913
secalert@redhat.comhttp://secunia.com/advisories/19230
secalert@redhat.comhttp://secunia.com/advisories/19377
secalert@redhat.comhttp://secunia.com/advisories/25729
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-931
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-932
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-937
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-938
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-940
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-936Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-950Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-961Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-962
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
secalert@redhat.comhttp://www.kde.org/info/security/advisory-20051207-2.txtPatch, Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:003
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:004
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:005
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:006
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:008
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:010
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:011
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:012
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.htmlPatch
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.htmlPatch
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0160.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0163.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/427053/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/427990/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/16143Patch
secalert@redhat.comhttp://www.trustix.org/errata/2006/0002/
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/0047
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2280
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/24026
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
secalert@redhat.comhttps://usn.ubuntu.com/236-1/
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2006-0177.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://scary.beasts.org/security/CESA-2005-003.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18147
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18303Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18312Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18313Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18329Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18332Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18334Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18335Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18338Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18349Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18373
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18375Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18380
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18385Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18387Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18389Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18398Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18407Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18414
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18416Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18423Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18425
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18428
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18436
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18448Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18463
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18517Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18534Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18554Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18582Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18642Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18644Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18674Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18675Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18679Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18908
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18913
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19230
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19377
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25729
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-931
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-932
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-937
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-938
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-940
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-936Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-950Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-961Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-962
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kde.org/info/security/advisory-20051207-2.txtPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0160.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0163.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427053/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427990/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16143Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0002/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0047
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2280
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/24026
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/236-1/
Impacted products
Vendor Product Version
easy_software_products cups 1.1.22
easy_software_products cups 1.1.22_rc1
easy_software_products cups 1.1.23
easy_software_products cups 1.1.23_rc1
kde kdegraphics 3.2
kde kdegraphics 3.4.3
kde koffice 1.4
kde koffice 1.4.1
kde koffice 1.4.2
kde kpdf 3.2
kde kpdf 3.4.3
kde kword 1.4.2
libextractor libextractor *
poppler poppler 0.4.2
sgi propack 3.0
tetex tetex 1.0.7
tetex tetex 2.0
tetex tetex 2.0.1
tetex tetex 2.0.2
tetex tetex 3.0
xpdf xpdf 3.0
conectiva linux 10.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
gentoo linux *
mandrakesoft mandrake_linux 10.1
mandrakesoft mandrake_linux 10.1
mandrakesoft mandrake_linux 10.2
mandrakesoft mandrake_linux 10.2
mandrakesoft mandrake_linux 2006
mandrakesoft mandrake_linux 2006
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 3.0
mandrakesoft mandrake_linux_corporate_server 3.0
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux_desktop 3.0
redhat enterprise_linux_desktop 4.0
redhat fedora_core core_1.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat fedora_core core_4.0
redhat linux 7.3
redhat linux 9.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
sco openserver 5.0.7
sco openserver 6.0
slackware slackware_linux 9.0
slackware slackware_linux 9.1
slackware slackware_linux 10.0
slackware slackware_linux 10.1
slackware slackware_linux 10.2
suse suse_linux 1.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.1
suse suse_linux 9.1
suse suse_linux 9.2
suse suse_linux 9.2
suse suse_linux 9.2
suse suse_linux 9.3
suse suse_linux 9.3
suse suse_linux 9.3
suse suse_linux 10.0
suse suse_linux 10.0
trustix secure_linux 2.0
trustix secure_linux 2.2
trustix secure_linux 3.0
turbolinux turbolinux 10
turbolinux turbolinux fuji
turbolinux turbolinux_appliance_server 1.0_hosting_edition
turbolinux turbolinux_appliance_server 1.0_workgroup_edition
turbolinux turbolinux_desktop 10.0
turbolinux turbolinux_home *
turbolinux turbolinux_multimedia *
turbolinux turbolinux_personal *
turbolinux turbolinux_server 8.0
turbolinux turbolinux_server 10.0
turbolinux turbolinux_server 10.0_x86
turbolinux turbolinux_workstation 8.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "787B918D-9CCC-44FE-92AF-E8DF1E91A3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "C116493B-2837-4531-9291-A9FF03099A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "525BD04B-387F-4713-BC89-472D0D0BCFD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BF92649-90CE-4E75-A938-61D0916B5A7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CA505B4-0C17-49C8-9533-CA8CE3AA77D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "37C08E0A-651F-458B-BCEC-A30DCD527E47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6000D6AF-C056-4BC0-A54C-72E23E52AB92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D036E4-FA49-417D-968B-9D73B16A09BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC2AB9CB-DEAB-45AB-A7CA-D19E069907EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAC32BAA-99B3-4B40-83A3-ED9E1B12B295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "679D9520-DE8E-4D06-A227-3B1C1D05977D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*",
                     matchCriteriaId: "EF8ABD90-AD2B-4FA0-A355-9D7CD6D3C486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9178B36F-41D5-4AE7-B9C8-56BDEADE76EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
                     matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
                     matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "AF8AE8C4-810F-41AB-A251-5A2D4DD6884D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*",
                     matchCriteriaId: "5EACF214-FA27-44FF-A431-927AB79377A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "E2B58895-0E2A-4466-9CB2-0083349A83B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "03F8220A-9B1C-40AA-AEAB-F9A93225FBD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "2311919C-7864-469D-B0F6-9B11D8D0A1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "19876495-4C1A-487C-955A-C5AA46362A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*",
                     matchCriteriaId: "D75286DD-50BC-4B72-8AC8-E20730124DC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "1998C972-497E-4916-B50E-FB32303EEA8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "A6CD3DD9-3A8A-4716-A2D1-136A790AFF94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "6CE2020A-4FB2-4FCD-8561-7BD147CD95EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "08E90AFA-C262-46D0-B60E-26B67C9602D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "0315FB43-D199-4734-B724-50ED031C0020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D69B83-4EF3-407B-8E8C-DE623F099C17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "7D221688-18A0-453D-8D13-6B68011FCA13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*",
                     matchCriteriaId: "597094EC-D23F-4EC4-A140-96F287679124",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "C4FCF0D3-A6CB-448E-B0D3-DA82BE02DEC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C720DACC-CF4B-4A00-818C-8303A7D7DED6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
                     matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7458BA31-812E-40C9-BB92-8688A3BCBA56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29C5A03-A7C9-4780-BB63-CF1E874D018D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "70440F49-AEE9-41BE-8E1A-43AB657C8E09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02EE2D72-B1E6-4380-80B0-E40A23DDD115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*",
                     matchCriteriaId: "F239BA8A-6B41-4B08-8C7C-25D235812C50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*",
                     matchCriteriaId: "89BA858B-9466-4640-84AE-DC5BDC65D6B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*",
                     matchCriteriaId: "85F2D904-E830-4034-9CCB-0FF65019622C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*",
                     matchCriteriaId: "3EA56868-ACA1-4C65-9FFB-A68129D2428A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*",
                     matchCriteriaId: "1BA2E629-58C6-4BA0-A447-F8F570B35E74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "D5F98B9A-880E-45F0-8C16-12B22970F0D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*",
                     matchCriteriaId: "3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*",
                     matchCriteriaId: "C89BA3B6-370B-4911-A363-935A9C9EACF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*",
                     matchCriteriaId: "4F1B4D15-0562-44D6-B80B-35A8F432BD41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*",
                     matchCriteriaId: "D84ABF78-0D85-4E15-907E-B5ACE86EB8C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "9C7018E7-F90C-435D-A07A-05A294EA2827",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*",
                     matchCriteriaId: "16915004-1006-41D6-9E42-D1A5041E442D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*",
                     matchCriteriaId: "994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "100A2456-BF20-4461-8DC9-C61889322B29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C7D4F57-E186-497A-B390-92E5D2C7E894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC3F6F3-9A6E-4A98-A967-6776C872475C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3218DD-A565-4AB8-86FE-E7F59AC0535F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*",
                     matchCriteriaId: "97AEDB57-202F-4B53-8815-21836F177060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E27180A1-9767-4CD3-978C-7538155B162D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAAA9376-A060-49AE-86A7-6B28E26ED5D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B484D091-62DE-4EF2-AC54-26896CA8B315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5AC26E-3F3F-4D14-BE65-82B4432AB382",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.",
      },
   ],
   id: "CVE-2005-3626",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-12-31T05:00:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
         ],
         url: "http://scary.beasts.org/security/CESA-2005-003.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18147",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18303",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18312",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18313",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18329",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18332",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18334",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18335",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18338",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18349",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18373",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18375",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18380",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18385",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18387",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18389",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18398",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18407",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18414",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18416",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18423",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18425",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18428",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18436",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18448",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18463",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18517",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18534",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18554",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18582",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18642",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18644",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18674",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18675",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18679",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18908",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18913",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/19230",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/19377",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25729",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-931",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-932",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-937",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-938",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-940",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-936",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-950",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-961",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2006/dsa-962",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/16143",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.trustix.org/errata/2006/0002/",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/0047",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/2280",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992",
      },
      {
         source: "secalert@redhat.com",
         url: "https://usn.ubuntu.com/236-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://scary.beasts.org/security/CESA-2005-003.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18147",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18303",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18312",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18313",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18329",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18334",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18335",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18349",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18373",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18375",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18380",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18385",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18387",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18389",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18398",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18407",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18414",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18416",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18423",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18425",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18428",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18436",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18448",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18463",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18517",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18534",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18554",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18582",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18642",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18644",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18674",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18675",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18679",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18908",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18913",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19230",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19377",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25729",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-931",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-932",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-937",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-938",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-940",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-936",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-950",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-961",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-962",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/16143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2006/0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/0047",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/2280",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/236-1/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2009-03-05 02:30
Modified
2025-04-09 00:30
Severity ?
Summary
nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
cve@mitre.orghttp://secunia.com/advisories/34067
cve@mitre.orghttp://secunia.com/advisories/34177
cve@mitre.orghttp://secunia.com/advisories/34473
cve@mitre.orghttp://securitytracker.com/id?1021910
cve@mitre.orghttp://securitytracker.com/id?1021911
cve@mitre.orghttp://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207
cve@mitre.orghttp://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1955
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-0361.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-0362.html
cve@mitre.orghttp://www.securityfocus.com/bid/33966Patch
cve@mitre.orghttp://www.securitytracker.com/id?1021908
cve@mitre.orghttp://www.ubuntu.com/usn/USN-727-1Vendor Advisory
cve@mitre.orghttp://www.ubuntu.com/usn/USN-727-2Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=487722
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=487752
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/49062
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34067
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34177
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34473
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021910
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021911
af854a3a-2127-422b-91ae-364da2661108http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207
af854a3a-2127-422b-91ae-364da2661108http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1955
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-0361.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-0362.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/33966Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021908
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-727-1Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-727-2Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=487722
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=487752
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49062
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 6.06
ubuntu ubuntu_linux 7.10
ubuntu ubuntu_linux 8.04
ubuntu ubuntu_linux 8.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:-:lts:*:*:*:*:*",
                     matchCriteriaId: "678EC327-EAC6-4923-9987-A9B78111B5C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "12DD761F-EA6F-4139-94ED-94EBC0F6A87D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED67B852-4B37-4B79-8F4D-23B2FEACA4ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.",
      },
      {
         lang: "es",
         value: "El manipulador de peticiones dbus en (1) network-manager-applet y (2) NetworkManager en Ubuntu v6.06 LTS, v7.10, v8.04 LTS, and v8.10 no verifica adecuadamente los privilegios, lo que permite a usuarios locales descubrir (a)las contraseñas de la conexión de red y (b)Las claves pre-compartidas a través de peticiones sin especificar.",
      },
   ],
   id: "CVE-2009-0365",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4.6,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:S/C:C/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.1,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2009-03-05T02:30:00.313",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/34067",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/34177",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/34473",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1021910",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1021911",
      },
      {
         source: "cve@mitre.org",
         url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207",
      },
      {
         source: "cve@mitre.org",
         url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2009/dsa-1955",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/33966",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id?1021908",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-727-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-727-2",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/34067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/34177",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/34473",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1021910",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1021911",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2009/dsa-1955",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/33966",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1021908",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-727-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-727-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2008-07-07 23:41
Modified
2025-04-09 00:30
Severity ?
Summary
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0616.html
secalert@redhat.comhttp://secunia.com/advisories/30878
secalert@redhat.comhttp://secunia.com/advisories/30898
secalert@redhat.comhttp://secunia.com/advisories/30903
secalert@redhat.comhttp://secunia.com/advisories/30911Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30949
secalert@redhat.comhttp://secunia.com/advisories/31005
secalert@redhat.comhttp://secunia.com/advisories/31008
secalert@redhat.comhttp://secunia.com/advisories/31021
secalert@redhat.comhttp://secunia.com/advisories/31023
secalert@redhat.comhttp://secunia.com/advisories/31069
secalert@redhat.comhttp://secunia.com/advisories/31076
secalert@redhat.comhttp://secunia.com/advisories/31183
secalert@redhat.comhttp://secunia.com/advisories/31195
secalert@redhat.comhttp://secunia.com/advisories/31377
secalert@redhat.comhttp://secunia.com/advisories/33433
secalert@redhat.comhttp://secunia.com/advisories/34501
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200808-03.xml
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2008-0216
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1607
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1615
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1697
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:136
secalert@redhat.comhttp://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15
secalert@redhat.comhttp://www.mozilla.org/security/announce/2008/mfsa2008-30.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0547.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0549.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0569.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/494080/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/30038
secalert@redhat.comhttp://www.securitytracker.com/id?1020419
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-619-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1993/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/0977
secalert@redhat.comhttps://bugzilla.mozilla.org/show_bug.cgi?id=411433
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2646
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0616.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30878
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30898
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30903
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30911Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30949
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31005
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31008
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31021
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31023
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31069
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31076
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31183
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31195
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31377
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33433
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34501
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200808-03.xml
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2008-0216
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1607
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1615
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1697
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:136
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/security/announce/2008/mfsa2008-30.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0547.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0549.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0569.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/494080/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30038
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020419
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-619-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1993/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0977
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.mozilla.org/show_bug.cgi?id=411433
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2646
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html
Impacted products
Vendor Product Version
redhat advanced_workstation_for_the_itanium_processor 2.1
redhat desktop 3.0
redhat desktop 4.0
redhat enterprise_linux 5_server
redhat enterprise_linux as_2.1
redhat enterprise_linux as_3
redhat enterprise_linux as_4
redhat enterprise_linux es_2.1
redhat enterprise_linux es_3
redhat enterprise_linux es_4
redhat enterprise_linux ws_2.1
redhat enterprise_linux ws_3
redhat enterprise_linux ws_4
redhat enterprise_linux_desktop 5_client
redhat enterprise_linux_desktop_workstation 5_client
redhat fedora 8
ubuntu ubuntu_linux 6.06
ubuntu ubuntu_linux 6.06
ubuntu ubuntu_linux 6.06
ubuntu ubuntu_linux 6.06
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.10
ubuntu ubuntu_linux 7.10
ubuntu ubuntu_linux 7.10
ubuntu ubuntu_linux 7.10
ubuntu ubuntu_linux 7.10
mozilla firefox 2.0
mozilla firefox 2.0
mozilla firefox 2.0
mozilla firefox 2.0
mozilla firefox 2.0.0.2
mozilla firefox 2.0.0.3
mozilla firefox 2.0.0.11
mozilla firefox 2.0.0.12
mozilla firefox 2.0.0.13
mozilla firefox 2.0.0.14
mozilla firefox 2.0_.1
mozilla firefox 2.0_.4
mozilla firefox 2.0_.5
mozilla firefox 2.0_.6
mozilla firefox 2.0_.9
mozilla firefox 2.0_.10
mozilla firefox 2.0_8
mozilla seamonkey 1.1
mozilla seamonkey 1.1.1
mozilla seamonkey 1.1.2
mozilla seamonkey 1.1.3
mozilla seamonkey 1.1.4
mozilla seamonkey 1.1.5
mozilla seamonkey 1.1.6
mozilla seamonkey 1.1.7
mozilla seamonkey 1.1.8
mozilla seamonkey 1.1.9
mozilla thunderbird 2.0_.4
mozilla thunderbird 2.0_.5
mozilla thunderbird 2.0_.6
mozilla thunderbird 2.0_.9
mozilla thunderbird 2.0_.12
mozilla thunderbird 2.0_.13
mozilla thunderbird 2.0_.14
mozilla thunderbird 2.0_8



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:advanced_workstation_for_the_itanium_processor:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D34CFC7-5112-45FA-A550-07C1174819CE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C8CB34E-02FE-4F90-9642-B56D3B3ACEF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB2579A-2BC9-4E16-9641-248222301660",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:5_server:*:*:*:*:*:*:*",
                     matchCriteriaId: "4089D3E3-C845-46F4-B4FC-8556D025704E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:as_2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF3EAB41-5B36-4D27-B319-17687D89868E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:as_3:*:*:*:*:*:*:*",
                     matchCriteriaId: "421C0021-66EB-4F4C-9D79-6366A4702CC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:as_4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F23BD8DF-6E8E-4DF2-A700-8E050D967547",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:es_2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "627D828A-A35B-4072-AFBA-1D26C68506F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:es_3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B0FE33D-756C-449F-B54C-8677C9AD002D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:es_4:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BF1F027-C9FF-4583-AB40-E0B757F9EE41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:ws_2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB10F52-FF81-4297-A4D3-D3298273D894",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:ws_3:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EA8914F-DB6D-4C21-A727-8B94BE0424BF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:ws_4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B18EBE6E-482D-435D-851C-73EC301F0A26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5_client:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C1E0CDD-78D0-4156-8572-6D430EF5499E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop_workstation:5_client:*:*:*:*:*:*:*",
                     matchCriteriaId: "043A85D0-7F3E-4EC9-9065-3F996B9A0A94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8E8256F-3FB6-45B2-8F03-02A61C10FAF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_amd64:*:*:*:*:*",
                     matchCriteriaId: "3107F20F-386F-4BF0-814F-4D7CAF0A2CBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_i386:*:*:*:*:*",
                     matchCriteriaId: "C027333C-8364-407A-B6D6-7B328C384632",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_powerpc:*:*:*:*:*",
                     matchCriteriaId: "B608D1D1-F05D-4F1B-BDED-A47EEC0E37FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_sparc:*:*:*:*:*",
                     matchCriteriaId: "64E79B04-2A84-4A5D-90F3-D4F02FDBA09D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "7BD79C43-2615-47DE-A100-D21482D866F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "1856594D-7D84-4830-A8A7-2C9D4C2D61FD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "0B20DDF0-2FAB-4EB0-B62D-2351514B2808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "B7748895-CE00-4BB8-BFCD-A5559BA15869",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "FB928CC9-0BC3-4AE1-B20B-A58A4C4AAE24",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "BB850565-A800-44A6-945E-CB235531C5DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:lpia:*:*:*:*:*",
                     matchCriteriaId: "A1BB8BDA-3F7A-408F-97FC-CBE422A09CCA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "3F37A796-E028-4247-A5E6-66B89A583F87",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "61DA44B7-FE1A-4452-843E-EAF1404B86F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3487FA64-BE04-42CA-861E-3DAC097D7D32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
                     matchCriteriaId: "F61EA4A1-1916-48A5-8196-E3CDEF3108F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "F5AA254D-D41E-464F-9E2A-A950F08C6946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "B05D2655-6641-42BE-9793-30005AC9D40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E2C7E7-56C0-466C-BB08-5EB43922C4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "462E135A-5616-46CC-A9C0-5A7A0526ACC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E391619-0967-43E1-8CBC-4D54F72A85C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "0544D626-E269-4677-9B05-7DAB23BD103B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "C95F7B2C-80FC-4DF2-9680-F74634DCE3E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "863C140E-DC15-4A88-AB8A-8AEF9F4B8164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "23D609B2-F66C-40F1-B7D9-965189F875A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "327D8879-0B61-4681-886D-C53BE251E0ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "59017F18-6C4E-4803-8A65-DB2A849C3197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF006282-943B-4885-B523-6E575D664059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CC11707-DF87-4046-964D-40CF22385A48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "F73F1171-E34D-4AC0-BF8B-3DB38AA13EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*",
                     matchCriteriaId: "0422C796-ECC4-42C1-9580-1CE22A096244",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "D58B704B-F06E-44C1-BBD1-A090D1E6583A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "40270FBD-744A-49D9-9FFA-1DCD897210D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "20E01097-F60A-4FB2-BA47-84A267EE87D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F65732F-317B-49A2-B9B0-FA1102B8B45C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB430F19-069A-43FD-9097-586D4449D327",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "76AD0439-3BFB-4AD1-8E2C-99D0B099FA8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E6D7528-E591-48A6-8165-BE42F8EBF6B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA710423-0075-44B8-9DCB-6380FA974486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5521DA3-E6AF-4350-B971-10B4A1C9B1D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD15752-A253-47B1-BCE0-B55B84B47C9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "63AF48A9-C161-4603-82F0-5D2DE1EBA498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "821E46E8-B084-4762-86F0-002CA288B522",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "A084C258-7D78-4F6D-8E24-00BE9608EBFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "893FD2C8-C8EF-4ED3-9B7C-82D8DA9A1C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9FEA455-E605-4CE3-A951-760D59091C56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1758117-4865-42A4-8110-2250924E21FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "81AF4BFB-EC89-454B-89DF-FC8F6102E28C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8013986B-DCAF-44A1-BA63-5BBA6762720F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.",
      },
      {
         lang: "es",
         value: "Mozilla Firefox anterior a 2.0.0.15 y SeaMonkey anterior a 1.1.10 no escapan correctamente el HTML en listados de directorios file:// URLs, lo que permite a atacantes remotos llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) o tener otros impactos no especificados mediante un nombre de archivo modificado.",
      },
   ],
   id: "CVE-2008-2808",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2008-07-07T23:41:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/30878",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/30898",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/30903",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30911",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/30949",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31005",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31008",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31021",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31023",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31069",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31076",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31183",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31195",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31377",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/33433",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/34501",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200808-03.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2008/dsa-1607",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2008/dsa-1615",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2009/dsa-1697",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/30038",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securitytracker.com/id?1020419",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/usn-619-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2008/1993/references",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2009/0977",
      },
      {
         source: "secalert@redhat.com",
         url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433",
      },
      {
         source: "secalert@redhat.com",
         url: "https://issues.rpath.com/browse/RPL-2646",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30878",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30898",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30903",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30911",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30949",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31005",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31008",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31076",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31183",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31195",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31377",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33433",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/34501",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200808-03.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2008/dsa-1607",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2008/dsa-1615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2009/dsa-1697",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/30038",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1020419",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-619-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/1993/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2009/0977",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.rpath.com/browse/RPL-2646",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110054671403755&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110055646329581&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110330519803655&w=2
cve@mitre.orghttp://secunia.com/advisories/13189
cve@mitre.orghttp://security.e-matters.de/advisories/132004.html
cve@mitre.orghttp://securitytracker.com/id?1012235
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/p-038.shtml
cve@mitre.orghttp://www.kb.cert.org/vuls/id/457622US Government Resource
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_40_samba.html
cve@mitre.orghttp://www.osvdb.org/11782
cve@mitre.orghttp://www.trustix.net/errata/2004/0058/Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18070
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110054671403755&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110055646329581&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110330519803655&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13189
af854a3a-2127-422b-91ae-364da2661108http://security.e-matters.de/advisories/132004.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1012235
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/p-038.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/457622US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_40_samba.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/11782
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.net/errata/2004/0058/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18070
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "216145B7-4716-42F7-90DC-03884ECB2271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "898968E5-577E-4B86-A804-EBEC67157A61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "920EF846-41D1-429D-AF0F-3D7950F93069",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8016DC4F-F410-4401-BDCC-91BE0D44D028",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "632D2489-3B5E-466E-A6DF-1EF00303869B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D40F682-9F2E-465F-98F7-23E1036C74A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "9478CC84-802F-4960-ACAB-3700154E813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small \"maximum data bytes\" value.",
      },
   ],
   id: "CVE-2004-0882",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-27T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt",
      },
      {
         source: "cve@mitre.org",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P",
      },
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/13189",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/132004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1012235",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ciac.org/ciac/bulletins/p-038.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/457622",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/11782",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.trustix.net/errata/2004/0058/",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/13189",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/132004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1012235",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ciac.org/ciac/bulletins/p-038.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/457622",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/11782",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.trustix.net/errata/2004/0058/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-07-06 20:05
Modified
2025-04-03 01:03
Severity ?
Summary
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "EF15862D-6108-4791-8817-622123C8D10C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "F1672825-AB87-4402-A628-B33AE5B7D4C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*",
                     matchCriteriaId: "939216D8-9E6C-419E-BC0A-EC7F0F29CE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "E520564E-964D-4758-945B-5EF0C35E605C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "2294D5A7-7B36-497A-B0F1-514BC49E1423",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.",
      },
      {
         lang: "es",
         value: "Comando passwd en shadow, en Ubuntu 5.04 through 6.06 LTS, cuando se pasa como parámetro –f, -g o –s, no comprueba el código de retorno de una llamada seguid, lo que podría provocar que usuarios locales obtuvieran privilegios de administrador (root) si seguid falla en casos como errores PAM o límite de recursos.",
      },
   ],
   id: "CVE-2006-3378",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-07-06T20:05:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20950",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20966",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/21480",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1150",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/26995",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/18850",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/usn-308-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20950",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20966",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/21480",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1150",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/26995",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/18850",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-308-1",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "This issue affects the version of the passwd command from the shadow-utils package.  Red Hat Enterprise Linux 2.1, 3, and 4 are not vulnerable to this issue.",
         lastModified: "2006-08-16T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870Patch
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
cve@mitre.orghttp://www.debian.org/security/2004/dsa-548Patch, Vendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200409-12.xmlPatch, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:089
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-465.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/11084Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17182
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870Patch
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-548Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200409-12.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:089
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-465.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11084Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17182
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843
Impacted products
Vendor Product Version
enlightenment imlib 1.9
enlightenment imlib 1.9.1
enlightenment imlib 1.9.2
enlightenment imlib 1.9.3
enlightenment imlib 1.9.4
enlightenment imlib 1.9.5
enlightenment imlib 1.9.6
enlightenment imlib 1.9.7
enlightenment imlib 1.9.8
enlightenment imlib 1.9.9
enlightenment imlib 1.9.10
enlightenment imlib 1.9.11
enlightenment imlib 1.9.12
enlightenment imlib 1.9.13
enlightenment imlib 1.9.14
enlightenment imlib2 1.0
enlightenment imlib2 1.0.1
enlightenment imlib2 1.0.2
enlightenment imlib2 1.0.3
enlightenment imlib2 1.0.4
enlightenment imlib2 1.0.5
enlightenment imlib2 1.1
enlightenment imlib2 1.1.1
imagemagick imagemagick 5.3.3
imagemagick imagemagick 5.4.3
imagemagick imagemagick 5.4.4.5
imagemagick imagemagick 5.4.7
imagemagick imagemagick 5.4.8
imagemagick imagemagick 5.4.8.2.1.1.0
imagemagick imagemagick 5.5.3.2.1.2.0
imagemagick imagemagick 5.5.6.0_2003-04-09
imagemagick imagemagick 5.5.7
imagemagick imagemagick 6.0.2
sun java_desktop_system 2.0
sun java_desktop_system 2003
conectiva linux 9.0
conectiva linux 10.0
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat fedora_core core_1.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
suse suse_linux 8.0
suse suse_linux 8.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
turbolinux turbolinux_desktop 10.0
turbolinux turbolinux_server 7.0
turbolinux turbolinux_server 8.0
turbolinux turbolinux_workstation 7.0
turbolinux turbolinux_workstation 8.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC774637-8B95-4C69-8665-86A67EAEBB24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9928B65C-A2F3-4D95-9A73-6DE4415463B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "072BDD6E-D815-4996-B78C-42502FB8BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE9D28DB-FFC6-4C7F-89F6-85740B239271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "988CDE52-220B-489D-9644-94CC5274E678",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B49B4277-ECFD-4568-94C1-6E02BF238A2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "882A873F-D3D3-4E11-9C6B-B45C53672711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA760F0-EFA2-4B4E-BB95-8FD857CD3250",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C72DEC7-5558-4121-89CE-6E9B382C849E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6880B01C-0804-4CCF-9916-89807BBD4C8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FE16231-4FB4-4D30-BE83-AD400E357280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "27937897-40B1-4D86-AFF0-ACA1B7F7A33E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "A533869A-BAF1-4A26-AD33-0C4B6A62AA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "917A16B8-65F3-4C5D-904E-DD0FBD46A3F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "89F6F148-15BA-4F07-A7A6-457B54FB234E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E1CF072-E421-4BAA-9B29-421B101171B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "630D2700-3AF2-4F6C-B045-41571B602B86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1750F261-8A88-4C9C-A86B-ED1D6F41C408",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7606397B-A6F0-41AA-8DA2-B3ECBC7374EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F69E5CC4-422F-4E4C-8E4C-8EA3479D759E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B6EC79E-A937-4781-AF55-35BCB2247C52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3DCF542-ABD1-448A-BD6F-F3FB4DB957C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6A7F9B2-116C-4AB8-98B0-729D0AB8545E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D83FADC-4C7F-4C16-BBAA-9883D7449744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B45B5EE8-00FB-46FE-9A26-7468AD30B540",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "6534A963-C0A7-47D6-8E1B-B8D0F3933428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FD06A99-7CBF-4593-9EA1-5D1A800D8C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BDC9494-E79B-4497-8413-A44DF326ABB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "563F49AC-D60F-4E00-9E0D-7EDAA2FFFCD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BDB0628-9BFD-4262-886C-E971EC262134",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CEEBE6-7CE6-4E1B-8828-EDD64EA3A338",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "193A610A-5E5E-4A87-A501-902100D1C2AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F682CD-0117-4770-877F-1F3903BAFE04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sun:java_desktop_system:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5537D6C-7700-4818-93F7-4449049DF131",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sun:java_desktop_system:2003:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1587AB3-180E-4734-A0AC-4EE5A93B469A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
                     matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "839D2945-1417-43F5-A526-A14C491CBCEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.",
      },
   ],
   id: "CVE-2004-0817",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-12-31T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
      },
      {
         source: "cve@mitre.org",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2004/dsa-548",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-465.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/11084",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2004/dsa-548",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-465.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/11084",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110072140811965&w=2
cve@mitre.orghttp://secunia.com/advisories/13232/
cve@mitre.orghttp://secunia.com/advisories/20162
cve@mitre.orghttp://secunia.com/advisories/20163
cve@mitre.orghttp://secunia.com/advisories/20202
cve@mitre.orghttp://secunia.com/advisories/20338
cve@mitre.orghttp://security.e-matters.de/advisories/142004.html
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1067
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1069
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1070
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1082
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:022
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-504.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-505.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-537.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/11695Patch, Vendor Advisory
cve@mitre.orghttp://www.trustix.org/errata/2004/0061/
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2336
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18137
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360
cve@mitre.orghttps://www.ubuntu.com/usn/usn-30-1/
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110072140811965&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13232/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20162
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20163
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20202
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20338
af854a3a-2127-422b-91ae-364da2661108http://security.e-matters.de/advisories/142004.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1067
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1069
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1070
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1082
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-504.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-505.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-537.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11695Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0061/
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2336
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18137
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-30-1/
Impacted products
Vendor Product Version
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.1
linux linux_kernel 2.4.2
linux linux_kernel 2.4.3
linux linux_kernel 2.4.4
linux linux_kernel 2.4.5
linux linux_kernel 2.4.6
linux linux_kernel 2.4.7
linux linux_kernel 2.4.8
linux linux_kernel 2.4.9
linux linux_kernel 2.4.10
linux linux_kernel 2.4.11
linux linux_kernel 2.4.12
linux linux_kernel 2.4.13
linux linux_kernel 2.4.14
linux linux_kernel 2.4.15
linux linux_kernel 2.4.16
linux linux_kernel 2.4.17
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.20
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.22
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23_ow2
linux linux_kernel 2.4.24
linux linux_kernel 2.4.24_ow1
linux linux_kernel 2.4.25
linux linux_kernel 2.4.26
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.2
linux linux_kernel 2.6.3
linux linux_kernel 2.6.4
linux linux_kernel 2.6.5
linux linux_kernel 2.6.6
linux linux_kernel 2.6.6
linux linux_kernel 2.6.7
linux linux_kernel 2.6.7
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.9
linux linux_kernel 2.6_test9_cvs
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
suse suse_linux 1.0
suse suse_linux 8
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
trustix secure_linux 1.5
trustix secure_linux 2.0
trustix secure_linux 2.1
trustix secure_linux 2.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
                     matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
                     matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
                     matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
                     matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
                     matchCriteriaId: "C7EAAD04-D7C4-43DE-B488-1AAD014B503E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "D2E2EF3C-1379-4CBE-8FF5-DACD47834651",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.",
      },
      {
         lang: "es",
         value: "La función smb_recv_trans2 en el sistema de ficheros samba (smbfs) en los kernel de Linux 2.4 y 2.6 no maneja adecuadamente el reensamblaje de paquetes fragmentados, lo que podría permitir a servidores samba remotos:\r\n\r\nleer información del kernel de su elección\r\naumentar un valor de un contador en un número arbitrario enviando la primera parte del paquete fragmentado varias veces.",
      },
   ],
   id: "CVE-2004-0949",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/13232/",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/142004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11695",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2004/0061/",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-30-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/13232/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/142004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11695",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2004/0061/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-30-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
References
cve@mitre.orghttp://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870Patch
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200409-12.xmlPatch, Vendor Advisory
cve@mitre.orghttp://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089
cve@mitre.orghttp://www.securityfocus.com/bid/11084Patch
cve@mitre.orghttp://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.htmlVendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17183
af854a3a-2127-422b-91ae-364da2661108http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870Patch
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200409-12.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11084Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17183
Impacted products
Vendor Product Version
enlightenment imlib 1.9
enlightenment imlib 1.9.1
enlightenment imlib 1.9.2
enlightenment imlib 1.9.3
enlightenment imlib 1.9.4
enlightenment imlib 1.9.5
enlightenment imlib 1.9.6
enlightenment imlib 1.9.7
enlightenment imlib 1.9.8
enlightenment imlib 1.9.9
enlightenment imlib 1.9.10
enlightenment imlib 1.9.11
enlightenment imlib 1.9.12
enlightenment imlib 1.9.13
enlightenment imlib 1.9.14
enlightenment imlib2 1.0
enlightenment imlib2 1.0.1
enlightenment imlib2 1.0.2
enlightenment imlib2 1.0.3
enlightenment imlib2 1.0.4
enlightenment imlib2 1.0.5
enlightenment imlib2 1.1
enlightenment imlib2 1.1.1
imagemagick imagemagick 5.3.3
imagemagick imagemagick 5.4.3
imagemagick imagemagick 5.4.4.5
imagemagick imagemagick 5.4.7
imagemagick imagemagick 5.4.8
imagemagick imagemagick 5.4.8.2.1.1.0
imagemagick imagemagick 5.5.3.2.1.2.0
imagemagick imagemagick 5.5.6.0_2003-04-09
imagemagick imagemagick 5.5.7
imagemagick imagemagick 6.0.2
sun java_desktop_system 2.0
sun java_desktop_system 2003
conectiva linux 9.0
conectiva linux 10.0
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat fedora_core core_1.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
suse suse_linux 8.0
suse suse_linux 8.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
turbolinux turbolinux_desktop 10.0
turbolinux turbolinux_server 7.0
turbolinux turbolinux_server 8.0
turbolinux turbolinux_workstation 7.0
turbolinux turbolinux_workstation 8.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC774637-8B95-4C69-8665-86A67EAEBB24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9928B65C-A2F3-4D95-9A73-6DE4415463B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "072BDD6E-D815-4996-B78C-42502FB8BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE9D28DB-FFC6-4C7F-89F6-85740B239271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "988CDE52-220B-489D-9644-94CC5274E678",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B49B4277-ECFD-4568-94C1-6E02BF238A2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "882A873F-D3D3-4E11-9C6B-B45C53672711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA760F0-EFA2-4B4E-BB95-8FD857CD3250",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C72DEC7-5558-4121-89CE-6E9B382C849E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6880B01C-0804-4CCF-9916-89807BBD4C8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FE16231-4FB4-4D30-BE83-AD400E357280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "27937897-40B1-4D86-AFF0-ACA1B7F7A33E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "A533869A-BAF1-4A26-AD33-0C4B6A62AA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "917A16B8-65F3-4C5D-904E-DD0FBD46A3F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "89F6F148-15BA-4F07-A7A6-457B54FB234E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E1CF072-E421-4BAA-9B29-421B101171B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "630D2700-3AF2-4F6C-B045-41571B602B86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1750F261-8A88-4C9C-A86B-ED1D6F41C408",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7606397B-A6F0-41AA-8DA2-B3ECBC7374EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F69E5CC4-422F-4E4C-8E4C-8EA3479D759E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B6EC79E-A937-4781-AF55-35BCB2247C52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3DCF542-ABD1-448A-BD6F-F3FB4DB957C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6A7F9B2-116C-4AB8-98B0-729D0AB8545E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D83FADC-4C7F-4C16-BBAA-9883D7449744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B45B5EE8-00FB-46FE-9A26-7468AD30B540",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "6534A963-C0A7-47D6-8E1B-B8D0F3933428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FD06A99-7CBF-4593-9EA1-5D1A800D8C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BDC9494-E79B-4497-8413-A44DF326ABB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "563F49AC-D60F-4E00-9E0D-7EDAA2FFFCD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BDB0628-9BFD-4262-886C-E971EC262134",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CEEBE6-7CE6-4E1B-8828-EDD64EA3A338",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "193A610A-5E5E-4A87-A501-902100D1C2AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F682CD-0117-4770-877F-1F3903BAFE04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sun:java_desktop_system:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5537D6C-7700-4818-93F7-4449049DF131",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sun:java_desktop_system:2003:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1587AB3-180E-4734-A0AC-4EE5A93B469A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
                     matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "839D2945-1417-43F5-A526-A14C491CBCEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.",
      },
   ],
   id: "CVE-2004-0802",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 4.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2004-12-31T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
      },
      {
         source: "cve@mitre.org",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/11084",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/11084",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.
References
cve@mitre.orghttp://secunia.com/advisories/17002
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-092.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-529.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-551.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-663.html
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/1878
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2336
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/15972
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795
cve@mitre.orghttps://www.ubuntu.com/usn/usn-38-1/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17002
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-092.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-529.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-551.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-663.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/1878
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2336
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/15972
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-38-1/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.",
      },
      {
         lang: "es",
         value: "El controlador Direct Rendering Manager (DRM) en el kernel de Linux 2.06 no comprueba adecuadamente el bloqueo DMA, lo que podría permitir a atacantes remotos o usuarios locales causar una denegación de servicio (caída del servidor X) y posiblemente modificar la salida de video.",
      },
   ],
   id: "CVE-2004-1056",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/17002",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-529.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-551.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-663.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2005/1878",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-38-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/17002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-529.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-551.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-663.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2005/1878",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-38-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-10-11 10:17
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354
cve@mitre.orghttp://secunia.com/advisories/27160Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27273Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27338Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27350Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32668Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1021157
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1
cve@mitre.orghttp://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1388
cve@mitre.orghttp://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.cPatch
cve@mitre.orghttp://www.openbsd.org/errata40.html#016_dhcpdPatch
cve@mitre.orghttp://www.openbsd.org/errata41.html#010_dhcpdPatch
cve@mitre.orghttp://www.openbsd.org/errata42.html#001_dhcpdPatch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0970.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/482085/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/483230/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/25984Patch
cve@mitre.orghttp://www.securityfocus.com/bid/32213
cve@mitre.orghttp://www.securitytracker.com/id?1018794
cve@mitre.orghttp://www.ubuntu.com/usn/usn-531-1
cve@mitre.orghttp://www.ubuntu.com/usn/usn-531-2
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3088Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/37045
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817
cve@mitre.orghttps://www.exploit-db.com/exploits/4601
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27160Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27273Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27338Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27350Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32668Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021157
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1
af854a3a-2127-422b-91ae-364da2661108http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1388
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.cPatch
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata40.html#016_dhcpdPatch
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata41.html#010_dhcpdPatch
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata42.html#001_dhcpdPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0970.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/482085/100/100/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/483230/100/100/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25984Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/32213
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018794
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-531-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-531-2
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3088Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/37045
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/4601
Impacted products
Vendor Product Version
debian debian_linux 3.1
debian debian_linux 4.0
openbsd openbsd 4.0
openbsd openbsd 4.1
openbsd openbsd 4.2
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat linux_advanced_workstation 2.1
sun opensolaris snv_01
sun opensolaris snv_01
sun opensolaris snv_02
sun opensolaris snv_02
sun opensolaris snv_03
sun opensolaris snv_03
sun opensolaris snv_04
sun opensolaris snv_04
sun opensolaris snv_05
sun opensolaris snv_05
sun opensolaris snv_06
sun opensolaris snv_06
sun opensolaris snv_07
sun opensolaris snv_07
sun opensolaris snv_08
sun opensolaris snv_08
sun opensolaris snv_09
sun opensolaris snv_09
sun opensolaris snv_10
sun opensolaris snv_10
sun opensolaris snv_11
sun opensolaris snv_11
sun opensolaris snv_12
sun opensolaris snv_12
sun opensolaris snv_13
sun opensolaris snv_13
sun opensolaris snv_14
sun opensolaris snv_14
sun opensolaris snv_15
sun opensolaris snv_15
sun opensolaris snv_16
sun opensolaris snv_16
sun opensolaris snv_17
sun opensolaris snv_17
sun opensolaris snv_18
sun opensolaris snv_18
sun opensolaris snv_19
sun opensolaris snv_19
sun opensolaris snv_20
sun opensolaris snv_20
sun opensolaris snv_21
sun opensolaris snv_21
sun opensolaris snv_22
sun opensolaris snv_22
sun opensolaris snv_23
sun opensolaris snv_23
sun opensolaris snv_24
sun opensolaris snv_24
sun opensolaris snv_25
sun opensolaris snv_25
sun opensolaris snv_26
sun opensolaris snv_26
sun opensolaris snv_27
sun opensolaris snv_27
sun opensolaris snv_28
sun opensolaris snv_28
sun opensolaris snv_29
sun opensolaris snv_29
sun opensolaris snv_30
sun opensolaris snv_30
sun opensolaris snv_31
sun opensolaris snv_31
sun opensolaris snv_32
sun opensolaris snv_32
sun opensolaris snv_33
sun opensolaris snv_33
sun opensolaris snv_34
sun opensolaris snv_34
sun opensolaris snv_35
sun opensolaris snv_35
sun opensolaris snv_36
sun opensolaris snv_36
sun opensolaris snv_37
sun opensolaris snv_37
sun opensolaris snv_38
sun opensolaris snv_38
sun opensolaris snv_39
sun opensolaris snv_39
sun opensolaris snv_40
sun opensolaris snv_40
sun opensolaris snv_41
sun opensolaris snv_41
sun opensolaris snv_42
sun opensolaris snv_42
sun opensolaris snv_43
sun opensolaris snv_43
sun opensolaris snv_44
sun opensolaris snv_44
sun opensolaris snv_45
sun opensolaris snv_45
sun opensolaris snv_46
sun opensolaris snv_46
sun opensolaris snv_47
sun opensolaris snv_47
sun opensolaris snv_48
sun opensolaris snv_48
sun opensolaris snv_49
sun opensolaris snv_49
sun opensolaris snv_50
sun opensolaris snv_50
sun opensolaris snv_51
sun opensolaris snv_51
sun opensolaris snv_52
sun opensolaris snv_52
sun opensolaris snv_53
sun opensolaris snv_53
sun opensolaris snv_54
sun opensolaris snv_54
sun opensolaris snv_55
sun opensolaris snv_55
sun opensolaris snv_56
sun opensolaris snv_56
sun opensolaris snv_57
sun opensolaris snv_57
sun opensolaris snv_58
sun opensolaris snv_58
sun opensolaris snv_59
sun opensolaris snv_59
sun opensolaris snv_60
sun opensolaris snv_60
sun opensolaris snv_61
sun opensolaris snv_61
sun opensolaris snv_62
sun opensolaris snv_62
sun opensolaris snv_63
sun opensolaris snv_63
sun opensolaris snv_64
sun opensolaris snv_64
sun opensolaris snv_65
sun opensolaris snv_65
sun opensolaris snv_66
sun opensolaris snv_66
sun opensolaris snv_67
sun opensolaris snv_67
sun opensolaris snv_68
sun opensolaris snv_68
sun opensolaris snv_69
sun opensolaris snv_69
sun opensolaris snv_70
sun opensolaris snv_70
sun opensolaris snv_71
sun opensolaris snv_71
sun opensolaris snv_72
sun opensolaris snv_72
sun opensolaris snv_73
sun opensolaris snv_73
sun opensolaris snv_74
sun opensolaris snv_74
sun opensolaris snv_75
sun opensolaris snv_75
sun opensolaris snv_76
sun opensolaris snv_76
sun opensolaris snv_77
sun opensolaris snv_77
sun opensolaris snv_78
sun opensolaris snv_78
sun opensolaris snv_79
sun opensolaris snv_79
sun opensolaris snv_80
sun opensolaris snv_80
sun opensolaris snv_81
sun opensolaris snv_81
sun opensolaris snv_82
sun opensolaris snv_82
sun opensolaris snv_83
sun opensolaris snv_83
sun opensolaris snv_84
sun opensolaris snv_84
sun opensolaris snv_85
sun opensolaris snv_85
sun opensolaris snv_86
sun opensolaris snv_86
sun opensolaris snv_87
sun opensolaris snv_87
sun opensolaris snv_88
sun opensolaris snv_88
sun opensolaris snv_89
sun opensolaris snv_89
sun opensolaris snv_90
sun opensolaris snv_90
sun opensolaris snv_91
sun opensolaris snv_91
sun opensolaris snv_92
sun opensolaris snv_92
sun opensolaris snv_93
sun opensolaris snv_93
sun opensolaris snv_94
sun opensolaris snv_94
sun opensolaris snv_95
sun opensolaris snv_95
sun opensolaris snv_96
sun opensolaris snv_96
sun opensolaris snv_97
sun opensolaris snv_97
sun opensolaris snv_98
sun opensolaris snv_98
sun opensolaris snv_99
sun opensolaris snv_99
sun opensolaris snv_100
sun opensolaris snv_100
sun opensolaris snv_101
sun opensolaris snv_101
sun opensolaris snv_102
sun opensolaris snv_102
sun solaris 8.0
sun solaris 8.0
sun solaris 9.0
sun solaris 9.0
sun solaris 10.0
sun solaris 10.0
ubuntu ubuntu_linux 6.06
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC77812C-D84E-493E-9D21-1BA6C2129E70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C117F3-3684-4683-9F9E-CEDD5B88F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DF8DD37-A337-4E9D-A34E-C2D561A24285",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
                     matchCriteriaId: "492EA1BE-E678-4300-A690-3BFCD4B233B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
                     matchCriteriaId: "4E3C9031-F69A-4B6A-A8CB-39027174AA01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
                     matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "7317C4A1-1365-40DD-A86F-808B64863750",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*",
                     matchCriteriaId: "7188371F-AE6E-437D-8F75-DE7049A51000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "79D94087-1308-408F-8C73-600B73AD958F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*",
                     matchCriteriaId: "015968E1-B81E-4242-B4DF-94716179053B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "DA468ACC-9AE2-4EF6-9B09-CF63092021D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*",
                     matchCriteriaId: "92262770-06B3-4B68-8DBE-AB6C61135F7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "16719C48-5A35-4FEC-BE5F-3EA10A0357CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*",
                     matchCriteriaId: "C4DC58C1-792B-433D-A27B-5731C8414EBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "5F87D3D5-0D3F-44BB-B15B-BB6D903A56E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*",
                     matchCriteriaId: "4AC63928-38F2-4677-8CBC-2F7DE0EF078F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "438EA608-2748-49E9-9B2A-663C774E627F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*",
                     matchCriteriaId: "41B216C6-4BE9-4D47-A86E-4AD50ECB8F07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "B7E3945D-1580-4C68-93E0-E4CF96620C6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*",
                     matchCriteriaId: "32AE7035-EA81-4A9B-A4C3-B85844E24FA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "51469BA0-7B46-4E79-9E35-A388AD834B29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*",
                     matchCriteriaId: "948CAA3F-C5B0-434E-A4B1-16600729A17E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "49F52449-96AB-45BA-95F6-581F720D1819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*",
                     matchCriteriaId: "168AD0C1-B437-4B5D-8AC4-BA4C6C60829B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "7FC6243A-A896-4E52-B241-BDEA7486DAC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*",
                     matchCriteriaId: "CDAD01B1-25E3-4ABD-BA48-03491D9C0D84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "E88850F1-A647-44B3-806A-71FC157D4964",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*",
                     matchCriteriaId: "B38088AD-968D-44B9-ABCE-4E4D8675A88A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "9D15E371-4317-4882-BA09-F8CABB632C2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*",
                     matchCriteriaId: "7C385492-0B33-4757-9907-E69C7F709527",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "311FC329-D973-4F51-B110-7FF1ED40DFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*",
                     matchCriteriaId: "01C7A393-6744-4913-A9CC-75F311D2C59F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "0288EC6B-C561-475C-9A3D-1ACF395B7326",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*",
                     matchCriteriaId: "F4961C98-1C39-4E6E-A0DB-C48E40F4FF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "D5CBEFF0-7B69-4831-AAC7-C02455D42900",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*",
                     matchCriteriaId: "4DCF6792-8671-4CC0-99D5-7224E2B751A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "6D4F7E6E-330F-4E02-A2FE-F7288ADFFA0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*",
                     matchCriteriaId: "FFB7E165-13D6-41D5-B1C3-F96669E54796",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "B5D6CD58-C4AF-42AC-9377-EC1F1308FF29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D6011B94-9326-47A7-8292-BA0210401DC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "AF924217-C227-4B90-9781-00561CE9C54A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*",
                     matchCriteriaId: "9C2C4B0B-9B7A-4861-8CA8-64FC84DF31BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "114D9D19-23BC-41AF-9B30-40AB2852E74F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*",
                     matchCriteriaId: "F36C1E99-8CCD-48B7-94A7-8753AD7D6FBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F620054A-4D53-443B-8897-B2A5AB928CA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*",
                     matchCriteriaId: "2F57B586-3593-41F9-9D01-0E18F58EB81A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "FD1FDEB4-E659-41D0-B81E-FC1A1391288E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*",
                     matchCriteriaId: "2E3B6A48-CA60-4ED9-BFF9-0FCDFABA865A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "218570AD-18C7-440E-A5BD-F16708ED4B08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*",
                     matchCriteriaId: "09162A43-7EF2-464D-AD60-7046456932B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "2336F214-18CC-42A5-9DD0-1F1C09959CC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*",
                     matchCriteriaId: "3A4ECA0D-AB73-4790-945B-98CF6E27B94F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "207D2103-58A9-4BF9-81EF-74B264DB1B4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*",
                     matchCriteriaId: "530E1CDB-3B46-4762-875F-0B1075790204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "8A4F9110-059D-4F6E-9414-762BD6142CDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*",
                     matchCriteriaId: "55888CA5-938A-42D4-9898-93ED1AD88650",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F1B245F6-DE46-4D52-98EE-32601FBCD254",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*",
                     matchCriteriaId: "5D99E1F3-0341-43A9-9692-2AC812811EA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "28F4B989-7F55-467F-AD1A-AB965D31F504",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*",
                     matchCriteriaId: "27CA0C51-8331-459A-8256-9E363BE313BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "9B6404BC-090E-419B-B10C-D275D5C0BFE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*",
                     matchCriteriaId: "3FD00DE9-D8A8-4A03-B4B8-3F4368ADDDE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "4CF81FF0-D544-4C56-AD2E-51098DF2A1D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*",
                     matchCriteriaId: "4EFFA4CB-0984-4686-94BD-CE4D8AD70C42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "65F861F1-E66D-479D-838D-19D94DF03736",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*",
                     matchCriteriaId: "BF0C5932-3B2B-44C8-8C0C-31A0CB66FF7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "71FDF1A5-BD49-4E00-979E-3F953265E681",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*",
                     matchCriteriaId: "B40B4B4C-34F3-4591-8989-D7D138D54C88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "815771B3-541B-41D5-925F-29CB74900668",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*",
                     matchCriteriaId: "14FD3B27-6379-4F5C-9172-2A0494667727",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "1EEAE62A-8BFA-4EB4-B4E9-DF83F4A33CCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*",
                     matchCriteriaId: "114D8B9E-BDE9-49E6-9CD3-18B087522577",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "72827B1E-3F3D-40A0-AEEB-0CFFB12BF6D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*",
                     matchCriteriaId: "8275DABB-E792-4134-8418-496109936C1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "6F61F300-FEB0-42A7-87AE-E99AF2C26827",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*",
                     matchCriteriaId: "56768A4B-ABC8-4CF8-ABF1-059C8D4373CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "E64D67D0-E57D-46A9-BA7E-BB7FA05C0907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*",
                     matchCriteriaId: "E249DDE1-EC3B-4A5C-A900-498526173570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "9500D5B2-DA1D-4082-83E4-92715D7F2D24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*",
                     matchCriteriaId: "2BE4A7FC-6112-4879-B083-19CC70DC6B91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "DD44C2D3-A690-4A9B-B855-EC2FEE8F5169",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*",
                     matchCriteriaId: "DE882906-FF9D-492A-BDB7-237575D5E278",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "C92D0B2A-BA10-4AEB-84B9-962DD1AA76EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*",
                     matchCriteriaId: "977AA6F7-F821-4229-B413-276231366899",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "BF7D0B02-7E5C-4760-96B2-902C680B897C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*",
                     matchCriteriaId: "F7B6E01F-E4EA-497E-BFB3-975F0123B4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "CF68EA11-632F-4710-8CC7-192AF1BD7BB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*",
                     matchCriteriaId: "9E644312-D55A-427F-BE4C-9AD280CC73F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F9EC26BC-09D3-4F19-864F-7A1C4EC4756B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*",
                     matchCriteriaId: "E7B7C4DE-DD83-4F61-B214-F0F9BD76E188",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "5994A4EE-3808-4863-B771-36864E202679",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*",
                     matchCriteriaId: "EF568362-9967-4ACB-A880-163A2E14D99A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "E977D01C-9C4B-411F-844E-7464147A12D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*",
                     matchCriteriaId: "13B5EE88-E97B-47A1-8999-21C8C4D0C0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "A37177FE-FB56-4BCB-88BA-B91963DA19EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*",
                     matchCriteriaId: "BD456A40-4017-4509-A4B0-44FBB3443645",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "BE640F29-CD64-44DD-9561-E205C5C241C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*",
                     matchCriteriaId: "F9456E55-1587-4BBF-A073-601D34E0CDB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "078D7F9B-E2A8-4DC2-AD2E-FB0865091ECE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*",
                     matchCriteriaId: "CD289DC7-2779-47B6-B44C-6B3C6EC5F93D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "0FE35481-4580-4208-A6FA-7A0429D73793",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*",
                     matchCriteriaId: "8163CA38-BF92-4F02-85EA-E6EFD5A500F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "84652D52-B89B-4127-9670-5FCDBBDE8053",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*",
                     matchCriteriaId: "6043F9A0-5FA1-4101-8452-E7A8652FE79C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "CE51773E-C93C-4549-907A-5AF380F24B7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*",
                     matchCriteriaId: "3CDC9FF7-5FC1-4473-920F-37105009BF2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "D98D67BD-6C94-4E77-B6AC-3199C281A1BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*",
                     matchCriteriaId: "6789ECB3-925F-4E16-9213-12FE3EB191CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "914CF995-B18B-43D2-AA9D-B486E768AFD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*",
                     matchCriteriaId: "9D309DD1-37A6-49BC-B8DB-6260D47DDD71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "922EE565-E3C2-44BA-9970-224FF874AE4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*",
                     matchCriteriaId: "28CBB9C9-54DB-4259-9D9F-C617E23C4221",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F8E26C9E-F87E-4484-89B9-42471F8410B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*",
                     matchCriteriaId: "FC09D568-2B1E-46A2-9029-B3850E5A1167",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "79E3D7EB-5B19-4D35-BE23-AB477E08FFEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*",
                     matchCriteriaId: "96E164AF-3346-4FF3-875A-5EA239F50BDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "B06BC6D2-385C-4BC4-9AAB-EEFF600DF2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D3B05762-2B56-41A1-B424-54A5CFFEC47A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "15B2F895-CBFB-4E19-AF7E-7011EB0A372E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*",
                     matchCriteriaId: "A6442F9F-E16E-4146-BA6D-92BBCB71EC63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "311F14F7-EE01-4525-8C58-8BF650246026",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*",
                     matchCriteriaId: "4D10B1B2-698B-4F02-9392-682AF78EC633",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "BC339789-4DC4-4A82-A1BE-CE59AC0D657F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*",
                     matchCriteriaId: "B69EECEC-86DB-4F35-9204-B0931ABC28DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "CF7C1C94-48A4-4F46-A337-92EB7B8C6837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*",
                     matchCriteriaId: "8130EE2C-DC76-4BE3-B2DC-6FC540CD5277",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "14C63D62-F6D4-4616-AF05-5E3387D63BC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*",
                     matchCriteriaId: "CFC0C58B-980F-4C65-97BF-67C9E731BA11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "6624E8DE-696A-402C-9088-CFE8ECC086BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*",
                     matchCriteriaId: "B0F7D5DE-0491-47F6-834A-0FA208213010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "04B5A32E-3D42-4500-A2BE-7ADFF3903386",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*",
                     matchCriteriaId: "8071BF6A-789C-4DB7-8247-B86EA34DB9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "244EBFE7-05DD-4BBB-9793-310D71AC1721",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*",
                     matchCriteriaId: "EECE627D-3AE8-4207-87A8-F95746F693F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "325EF996-AB8D-48CE-9A59-D338C823D927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*",
                     matchCriteriaId: "E6950900-2293-4DA0-89E8-DAFABBF423DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "0EC8063A-1266-4443-B404-BB9C4D265B75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*",
                     matchCriteriaId: "AB4764E7-E772-45BC-896B-C7BE287A8EAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "424C989F-99C8-4337-AF15-4A51329938DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*",
                     matchCriteriaId: "4122F0EE-3A2F-456F-B8CF-82565F8DCD4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "DA7ED4ED-938F-44B7-85ED-AFA6728DFE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*",
                     matchCriteriaId: "5686A925-4978-4883-8DC1-978B09DC9489",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "43F1BFC7-BA9F-44EE-BD08-F70DFB2CFB33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*",
                     matchCriteriaId: "13B81B14-84C8-468A-AE11-30C4CB85E6F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "059880C5-B7FF-492D-97CA-FBC174FF8BF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*",
                     matchCriteriaId: "6395A3A9-97F2-4C88-B6D6-70DB2ACDC70D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "5AC08000-2E71-465A-85F0-1AB8D1A51762",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*",
                     matchCriteriaId: "8CC54F69-E96A-482F-B43D-2E3A7EC90E47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "D5CCA31F-9BF3-4E6F-B72C-1A54AFB1D07B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*",
                     matchCriteriaId: "CDC656B7-529A-4963-955D-301A11CF5D09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "C5D58609-62CB-446F-995E-FD334B89F6BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*",
                     matchCriteriaId: "506769C9-D306-4EEC-BE2E-6E501CBE90BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "D45394E8-BE87-4BAC-89CE-B1F0E4BBBE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*",
                     matchCriteriaId: "37540C8F-FCC1-42DA-8EE3-D3E4FA5B315C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "1B0F8F99-99B0-4A01-884B-442CEF8D061A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*",
                     matchCriteriaId: "7AD5054B-18D8-44AE-AA4F-A07D12A63E55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "0CCE3456-0BA0-4303-B7CE-22B63EE86F03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*",
                     matchCriteriaId: "4BAD68C2-4AA2-4346-B279-51206E0651FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "A4027F7E-F867-4DC7-BA53-08D7B36E13F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*",
                     matchCriteriaId: "96F3D4B3-7828-40EB-BD67-A3CD5B210787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "906228D3-2561-45C0-A79D-BAAC9F1AD7ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*",
                     matchCriteriaId: "C166F9F7-E8AB-4BA1-AEB6-1E7964976801",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "7BE4DE93-D189-4528-89DA-17E9325457E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*",
                     matchCriteriaId: "12B6730F-6CF1-4990-953F-1CC76D78B618",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "C4D46760-1924-4713-963E-E4A9AD085394",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*",
                     matchCriteriaId: "03B96DE7-70BD-4CD8-9574-8C024E51E91C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "B579204A-62EB-4D86-A22B-0726B9CB88DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*",
                     matchCriteriaId: "52D5BB76-FF5E-4BBA-A2D0-00EB574B9104",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "636FD13F-0A30-4B03-8AEC-ED225FC71251",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*",
                     matchCriteriaId: "C29B1192-D709-48FB-816C-B4F30460E957",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "B0593352-A568-4DDA-B1B8-77FA6DC93B54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*",
                     matchCriteriaId: "6DB1AC08-2564-4AAB-82AE-EB504FAA34FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "5299CAB1-9819-4AE4-9429-8CA32F692C86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*",
                     matchCriteriaId: "46D8D5D1-8855-4116-99B3-EA1F78FDEF02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "ECD23A89-A86B-44D3-A3D1-EFF3D8551DCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*",
                     matchCriteriaId: "999FFE1D-D7D4-476B-8A46-9D0179DB570B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "75B778E3-EFCF-4AB0-B2C7-E585C190CD3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*",
                     matchCriteriaId: "2B14945C-350A-4895-92C1-932208533F9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "80CFB4CD-CE38-4F24-87EE-0CA622E4E9A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*",
                     matchCriteriaId: "513D435B-D28B-4833-88E6-A1A8743177F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "460EE9E9-27BA-4C8B-9F06-BBA648105720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*",
                     matchCriteriaId: "4126C6C9-90AB-470E-AF83-4ED1FDD90511",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "57CA01EF-2AFC-44FB-96EE-AF85B3019BEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*",
                     matchCriteriaId: "3275E47F-5A4B-4843-A07C-82DEE852672C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "CD673F9F-442E-4997-A0E3-D4B595D16B3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*",
                     matchCriteriaId: "58017DDC-63B3-458C-9803-4683211A4C3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "0BEADEEA-4D63-4E69-BFEE-02205150F909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*",
                     matchCriteriaId: "6692EE63-A76B-47C3-BC0D-7C15CA6FE013",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "54DA5312-D935-444E-8154-514C5BD6E3F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*",
                     matchCriteriaId: "BA1E27E5-FE20-42FA-9A61-A7174E705EB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "EA41BAD9-BC09-4E5C-8759-AD4E4D2B3ACC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*",
                     matchCriteriaId: "65A32803-580D-4D07-B39B-2159258CBA8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "FF6EFE12-51AD-4879-9529-B7EA425059C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*",
                     matchCriteriaId: "13B51612-3BD6-449F-AD63-D01F8D05B269",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "7E32AD47-A96B-4A83-AEA2-98E6DD1FD5BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*",
                     matchCriteriaId: "4B2E7E54-2268-4C54-9363-C2D363D3A447",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "7A54DEC9-4F04-4E0A-B253-8822F114DCC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*",
                     matchCriteriaId: "F6000B0F-0E72-4E68-A5EE-35BA6FB59C57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "447E9E9E-5B19-4261-8B70-F63EAE61DB95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*",
                     matchCriteriaId: "51AB0746-66E6-4FF5-9CB2-42E29A01C961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "2B4A015E-802F-4440-AF10-683B5E0586B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D1A9DCF7-F469-4D77-966F-3721F377D80B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "04D12F3A-4C47-4B49-B3DE-484C1EE466E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*",
                     matchCriteriaId: "3D028821-CA38-48C4-9324-222526AC8413",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "5BE8232A-2464-449A-A7B6-D44447AA9080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*",
                     matchCriteriaId: "1F2CB558-9390-4AAE-A66D-E3DA537E3115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "37D9D7A5-63F5-49F6-90EE-EBE5B3FA6DBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*",
                     matchCriteriaId: "5ED4FAD0-E91F-438D-A3CB-BACFB7F7E975",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "6061C499-21A8-4EC4-B5AD-F6E876B15C48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*",
                     matchCriteriaId: "411B33D1-F55D-42C0-9046-040ABC42E31B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "32CF7469-6D2F-4E34-8013-7F0D3433D0B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
                     matchCriteriaId: "1894C542-AA81-40A9-BF47-AE24C93C1ACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "A711CDC2-412C-499D-9FA6-7F25B06267C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
                     matchCriteriaId: "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "7BF232A9-9E0A-481E-918D-65FC82EF36D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*",
                     matchCriteriaId: "0C0C3793-E011-4915-8F86-CE622A2D37D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:_nil_:lts:*:*:*:*:*",
                     matchCriteriaId: "8CC514F1-FFCF-4ADD-8A2C-F22C693F9DCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "33904E65-D50D-4EAE-885D-FE2EBF535F18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A940B9-A553-4A0B-8ECF-52FD26894285",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.",
      },
      {
         lang: "es",
         value: "Un desbordamiento de búfer en la región stack de la memoria en la función cons_options en el archivo options.c en dhcpd en OpenBSD versiones 4.0 hasta 4.2, y algunas otras implementaciones de dhcpd basadas en ISC dhcp-2, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (bloqueo del demonio) por medio de una petición DHCP que especifica un tamaño máximo de mensaje más pequeño que el IP MTU mínimo.",
      },
   ],
   id: "CVE-2007-5365",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-10-11T10:17:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27160",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27273",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27338",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27350",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/32668",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1021157",
      },
      {
         source: "cve@mitre.org",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2007/dsa-1388",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.openbsd.org/errata40.html#016_dhcpd",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.openbsd.org/errata41.html#010_dhcpd",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.openbsd.org/errata42.html#001_dhcpd",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/25984",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/32213",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id?1018794",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/usn-531-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/usn-531-2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2008/3088",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.exploit-db.com/exploits/4601",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27160",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27273",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27350",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/32668",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1021157",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2007/dsa-1388",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openbsd.org/errata40.html#016_dhcpd",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openbsd.org/errata41.html#010_dhcpd",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openbsd.org/errata42.html#001_dhcpd",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/25984",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/32213",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1018794",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-531-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-531-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2008/3088",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.exploit-db.com/exploits/4601",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-03-21 19:19
Modified
2025-04-09 00:30
Severity ?
Summary
Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
References
security@ubuntu.comhttp://secunia.com/advisories/24584
security@ubuntu.comhttp://secunia.com/advisories/24597
security@ubuntu.comhttp://secunia.com/advisories/24615
security@ubuntu.comhttp://secunia.com/advisories/24661
security@ubuntu.comhttp://secunia.com/advisories/24859
security@ubuntu.comhttp://secunia.com/advisories/25072
security@ubuntu.comhttp://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106Patch
security@ubuntu.comhttp://www.gentoo.org/security/en/glsa/glsa-200704-10.xml
security@ubuntu.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:069
security@ubuntu.comhttp://www.novell.com/linux/security/advisories/2007_8_sr.html
security@ubuntu.comhttp://www.securityfocus.com/archive/1/463710/100/0/threaded
security@ubuntu.comhttp://www.securityfocus.com/bid/23070
security@ubuntu.comhttp://www.securityfocus.com/bid/23138
security@ubuntu.comhttp://www.ubuntu.com/usn/usn-438-1Vendor Advisory
security@ubuntu.comhttp://www.vupen.com/english/advisories/2007/1059
security@ubuntu.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/33163
security@ubuntu.comhttps://issues.rpath.com/browse/RPL-1170
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24584
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24597
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24615
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24661
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24859
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25072
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106Patch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:069
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_8_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/463710/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23070
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23138
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-438-1Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1059
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33163
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1170
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE3B4BE-7B43-47C7-823A-C019DF12498F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD9460AD-229A-4DC2-BFBA-818640A464AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:inkscape:inkscape:0.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D218B9A-193B-4956-B710-8998FC60A6F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:inkscape:inkscape:0.41:*:*:*:*:*:*:*",
                     matchCriteriaId: "A061EEF7-FBD3-4BBD-BCAA-9F765567C606",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:inkscape:inkscape:0.42:*:*:*:*:*:*:*",
                     matchCriteriaId: "57038D30-192C-4899-A705-E951E162B871",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:inkscape:inkscape:0.42.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "45441330-3BDD-4F8F-B128-0C431AB9A9C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:inkscape:inkscape:0.42.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4783CB07-5F32-4FF6-85D4-2F3FE21DD75B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:inkscape:inkscape:0.43:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EAE5DD1-E2DB-4905-83B2-348257A4E49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:inkscape:inkscape:0.44:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6EBAFFC-12A6-42D2-9840-289BFD720F8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad en el formato de cadena en el Inkscape anterior al 0.45.1 permite a atacantes con la intervención del usuario ejecutar código de su elección mediante especificadores del formato de cadena en una URI,lo que no es manejado correctamente mediante ciertos diálogos.",
      },
   ],
   id: "CVE-2007-1463",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: true,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2007-03-21T19:19:00.000",
   references: [
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/24584",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/24597",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/24615",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/24661",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/24859",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/25072",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Patch",
         ],
         url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.securityfocus.com/bid/23070",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.securityfocus.com/bid/23138",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-438-1",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.vupen.com/english/advisories/2007/1059",
      },
      {
         source: "security@ubuntu.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163",
      },
      {
         source: "security@ubuntu.com",
         url: "https://issues.rpath.com/browse/RPL-1170",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24584",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24597",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24661",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24859",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25072",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/23070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/23138",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-438-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/1059",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.rpath.com/browse/RPL-1170",
      },
   ],
   sourceIdentifier: "security@ubuntu.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-04-22 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.
Impacted products
Vendor Product Version
kde quanta 3.1
conectiva linux 9.0
conectiva linux 10.0
gentoo linux *
kde kde 3.2
kde kde 3.2.1
kde kde 3.2.2
kde kde 3.2.3
kde kde 3.3
kde kde 3.3.1
kde kde 3.3.2
kde kde 3.4
redhat fedora_core core_3.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:kde:quanta:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0716B886-DF42-4BB2-BE9F-423A4CBE5001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82F69843-978D-4686-BC5B-1D09DA4A21BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACEE0AED-7918-41E9-A902-AC4070E03132",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E19472-47B4-4398-A188-CA5A5D3E7060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D17407A2-089E-43A5-9BD5-EFF966F5CC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C4B436D-8D6A-473E-B707-26147208808B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E26B353-4985-4116-B97A-5767CDC732F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F7180B3-03AC-427C-8CAD-FE06F81C4FF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "442021C9-BE4D-4BC9-8114-8BEFA9EC1232",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.",
      },
   ],
   id: "CVE-2005-0754",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-04-22T04:00:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff",
      },
      {
         source: "secalert@redhat.com",
         url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/15060",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.kde.org/info/security/advisory-20050420-1.txt",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/13313",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/15060",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.kde.org/info/security/advisory-20050420-1.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/13313",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
cve@mitre.orghttp://isec.pl/vulnerabilities/isec-0018-igmp.txt
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110306397320336&w=2
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:022
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_44_kernel.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-092.html
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2336
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18481
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18482
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
af854a3a-2127-422b-91ae-364da2661108http://isec.pl/vulnerabilities/isec-0018-igmp.txt
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110306397320336&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_44_kernel.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-092.html
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2336
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18481
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18482
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144
Impacted products
Vendor Product Version
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.1
linux linux_kernel 2.4.2
linux linux_kernel 2.4.3
linux linux_kernel 2.4.4
linux linux_kernel 2.4.5
linux linux_kernel 2.4.6
linux linux_kernel 2.4.7
linux linux_kernel 2.4.8
linux linux_kernel 2.4.9
linux linux_kernel 2.4.10
linux linux_kernel 2.4.11
linux linux_kernel 2.4.12
linux linux_kernel 2.4.13
linux linux_kernel 2.4.14
linux linux_kernel 2.4.15
linux linux_kernel 2.4.16
linux linux_kernel 2.4.17
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.20
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.22
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23_ow2
linux linux_kernel 2.4.24
linux linux_kernel 2.4.24_ow1
linux linux_kernel 2.4.25
linux linux_kernel 2.4.26
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.28
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.2
linux linux_kernel 2.6.3
linux linux_kernel 2.6.4
linux linux_kernel 2.6.5
linux linux_kernel 2.6.6
linux linux_kernel 2.6.6
linux linux_kernel 2.6.7
linux linux_kernel 2.6.7
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.9
linux linux_kernel 2.6_test9_cvs
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
                     matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
                     matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
                     matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.",
      },
   ],
   id: "CVE-2004-1137",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
      },
      {
         source: "cve@mitre.org",
         url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-03-05 05:00
Modified
2025-04-03 01:03
Summary
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txtThird Party Advisory
cve@mitre.orghttp://marc.info/?l=freebsd-hackers&m=110994026421858&w=2Mailing List
cve@mitre.orghttp://marc.info/?l=freebsd-security&m=110994370429609&w=2Mailing List
cve@mitre.orghttp://marc.info/?l=openbsd-misc&m=110995101417256&w=2Mailing List
cve@mitre.orghttp://secunia.com/advisories/15348Permissions Required
cve@mitre.orghttp://secunia.com/advisories/18165Permissions Required
cve@mitre.orghttp://securitytracker.com/id?1013967Patch, Third Party Advisory, VDB Entry, Vendor Advisory
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754Broken Link
cve@mitre.orghttp://www.daemonology.net/hyperthreading-considered-harmful/Third Party Advisory
cve@mitre.orghttp://www.daemonology.net/papers/htt.pdfThird Party Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/911878Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-476.htmlNot Applicable
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-800.htmlNot Applicable
cve@mitre.orghttp://www.securityfocus.com/bid/12724Patch, Third Party Advisory, VDB Entry, Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/0540Permissions Required
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/3002Permissions Required
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txtThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2Mailing List
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=freebsd-security&m=110994370429609&w=2Mailing List
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=openbsd-misc&m=110995101417256&w=2Mailing List
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/15348Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18165Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1013967Patch, Third Party Advisory, VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.daemonology.net/hyperthreading-considered-harmful/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.daemonology.net/papers/htt.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/911878Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-476.htmlNot Applicable
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-800.htmlNot Applicable
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12724Patch, Third Party Advisory, VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/0540Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/3002Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747Third Party Advisory
Impacted products
Vendor Product Version
freebsd freebsd 1.1.5.1
freebsd freebsd 2.0
freebsd freebsd 2.0.5
freebsd freebsd 2.1.0
freebsd freebsd 2.1.5
freebsd freebsd 2.1.6
freebsd freebsd 2.1.6.1
freebsd freebsd 2.1.7.1
freebsd freebsd 2.2
freebsd freebsd 2.2.2
freebsd freebsd 2.2.3
freebsd freebsd 2.2.4
freebsd freebsd 2.2.5
freebsd freebsd 2.2.6
freebsd freebsd 2.2.8
freebsd freebsd 3.0
freebsd freebsd 3.0
freebsd freebsd 3.1
freebsd freebsd 3.2
freebsd freebsd 3.3
freebsd freebsd 3.4
freebsd freebsd 3.5
freebsd freebsd 3.5
freebsd freebsd 3.5.1
freebsd freebsd 3.5.1
freebsd freebsd 3.5.1
freebsd freebsd 4.0
freebsd freebsd 4.0
freebsd freebsd 4.0
freebsd freebsd 4.1
freebsd freebsd 4.1.1
freebsd freebsd 4.1.1
freebsd freebsd 4.1.1
freebsd freebsd 4.2
freebsd freebsd 4.2
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6.2
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
freebsd freebsd 5.2.1
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.4
freebsd freebsd 5.4
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux_desktop 3.0
redhat enterprise_linux_desktop 4.0
redhat fedora_core core_3.0
sco openserver 5.0.7
sco unixware 7.1.3
sco unixware 7.1.3_up
sco unixware 7.1.4
sun solaris 7.0
sun solaris 8.0
sun solaris 9.0
sun solaris 9.0
sun solaris 10.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C496B665-70DA-4B98-A5D1-E2935C0CE840",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "34797660-41F5-4358-B70F-2A40DE48F182",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "27C9E23D-AB82-4AE1-873E-C5493BB96AA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4054D69F-596F-4EB4-BE9A-E2478343F55A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA26ABBE-9973-45FA-9E9B-82170B751219",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7891202C-62AF-4590-9E5F-3514FDA2B38E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF8F9B2F-E898-4F87-A245-32A41748587B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "183667CA-6DF1-4BFB-AE32-9ABF55B7283A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBDDEC3F-52EB-4E1E-84C4-B472600059EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58E02AE-38B4-466E-BF73-2F0B80AF7BA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3928D5CF-6FC0-434C-8A80-ABDBF346C2C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "314BA420-4C74-4060-8ACE-D7A7C041CF2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EAD7613-A5B3-4621-B981-290C7C6B8BA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1CA3337-9BEE-49C5-9EDE-8CDBE5580537",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE38C50A-81FE-412E-9717-3672FAE6A6F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*",
                     matchCriteriaId: "A0A3F7B6-2878-40C0-B59C-EBA8D171D2F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "263F3734-7076-4EA8-B4C0-F37CFC4E979E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0419DD66-FF66-48BC-AD3B-F6AFD0551E36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B982342C-1981-4C55-8044-AFE4D87623DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E02BE6-4800-4940-B269-385B66AC5077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.5:stable:*:*:*:*:*:*",
                     matchCriteriaId: "0EB09993-B837-4352-B09D-3656F62638A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C283AD7-1C58-4CE8-A6CD-502FFE0B18BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.5.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "0361EA35-FBD7-4E8F-8625-C8100ED7BB7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.5.1:stable:*:*:*:*:*:*",
                     matchCriteriaId: "29EAA113-2404-4ABB-826B-3AA2AA858D02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0A585A1-FF82-418F-90F8-072458DB7816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "E3F7EB61-55A5-4776-B0E7-3508920A6CEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*",
                     matchCriteriaId: "A442DE97-4485-4D95-B95D-58947585E455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE31DFF8-06AB-489D-A0C5-509C090283B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "1E8A6564-129A-4555-A5ED-6F65C56AE7B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*",
                     matchCriteriaId: "237174A4-E030-4A0B-AD0B-5C463603EAA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF49BF03-C25E-4737-84D5-892895C86C58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*",
                     matchCriteriaId: "5D7F8F11-1869-40E2-8478-28B4E946D3CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2019E0E-426B-43AF-8904-1B811AE171E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*",
                     matchCriteriaId: "9062BAB5-D437-49BE-A384-39F62434B70B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*",
                     matchCriteriaId: "3BA1504C-14FE-4C21-A801-944041F2946F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*",
                     matchCriteriaId: "21B69535-4FB6-4FAD-AAA6-C790FF82EFAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*",
                     matchCriteriaId: "6E53C673-9D6D-42C8-A502-033E1FC28D97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "55C5FC1A-1253-4390-A4FC-573BB14EA937",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
                     matchCriteriaId: "6F4AC452-6042-409D-8673-ACAD108EE3B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2FE1009B-371A-48E2-A456-935A1F0B7D0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
                     matchCriteriaId: "C844A170-B5A7-4703-AF3B-67366D44EA8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "44308D13-D935-4FF8-AB52-F0E115ED1AD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
                     matchCriteriaId: "3D41CB12-7894-4D25-80EC-23C56171D973",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
                     matchCriteriaId: "9BCD9C12-EDAB-473F-9CC5-04F06B413720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
                     matchCriteriaId: "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
                     matchCriteriaId: "09789843-6A1A-4CDB-97E8-89E82B79DDB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C001822-FDF8-497C-AC2C-B59A00E9ACD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
                     matchCriteriaId: "118211EF-CED7-4EB5-9669-F54C8169D4AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
                     matchCriteriaId: "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
                     matchCriteriaId: "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
                     matchCriteriaId: "9A405AE2-ECC4-4BB0-80DD-4736394FB217",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B86C77AB-B8FF-4376-9B4E-C88417396F3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
                     matchCriteriaId: "E5612FB0-8403-4A7E-B89A-D7BDFAC00078",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
                     matchCriteriaId: "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
                     matchCriteriaId: "AFDA151E-E614-4A24-A34D-B6D5309110CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
                     matchCriteriaId: "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*",
                     matchCriteriaId: "09BFA20B-2F31-4246-8F74-63DF1DB884EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*",
                     matchCriteriaId: "5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EAEA17-033A-4A50-8E39-D61154876D2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*",
                     matchCriteriaId: "4AE93D3D-34B4-47B7-A784-61F4479FF5A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
                     matchCriteriaId: "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FFD9D1C-A459-47AD-BC62-15631417A32F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
                     matchCriteriaId: "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
                     matchCriteriaId: "6E21E50A-A368-4487-A791-87366CC5C86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
                     matchCriteriaId: "43E84296-9B5C-4623-A2C4-431D76FC2765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
                     matchCriteriaId: "E18328E2-3CB5-4D36-8EA3-77DD909B46A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
                     matchCriteriaId: "EF73D76B-FBB8-4D10-8393-9FAF53392A4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
                     matchCriteriaId: "F177AE1C-58C2-4575-807C-ABFFC5119FA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "3B13D898-C1B6-44B9-8432-7DDB8A380E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
                     matchCriteriaId: "51A612F6-E4EB-4E34-8F55-79E16C74758E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
                     matchCriteriaId: "5C19B266-8FE7-49ED-8678-2D522257491D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "15C4D826-A419-45F5-B91C-1445DB480916",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
                     matchCriteriaId: "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                     matchCriteriaId: "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD7C441E-444B-4DF5-8491-86805C70FB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
                     matchCriteriaId: "8E4BC012-ADE4-468F-9A25-261CD8055694",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8A80E6A-6502-4A33-83BA-7DCC606D79AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
                     matchCriteriaId: "0D6428EB-5E1A-41CB-979C-4C9402251D8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2DCA9879-C9F5-475A-8EC9-04D151001C8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
                     matchCriteriaId: "0A94132F-4C47-49CC-B03C-8756613E9A38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*",
                     matchCriteriaId: "46A60ED5-1D92-4B40-956F-D1801CAB9039",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
                     matchCriteriaId: "3F629879-66F0-427B-86D8-D740E0E3F6E8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "67E12F60-B4AF-4EF1-A4AA-5E9F0B8B0690",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:unixware:7.1.3_up:*:*:*:*:*:*:*",
                     matchCriteriaId: "D953B3BB-F054-4FE9-839E-2D8EC5C7973A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:unixware:7.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "059218D3-A3AD-4A10-9AA4-FBB689321D90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
                     matchCriteriaId: "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
                     matchCriteriaId: "1894C542-AA81-40A9-BF47-AE24C93C1ACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
                     matchCriteriaId: "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*",
                     matchCriteriaId: "3F305CBD-4329-44DE-A85C-DE9FF371425E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "7BF232A9-9E0A-481E-918D-65FC82EF36D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.",
      },
   ],
   id: "CVE-2005-0109",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.7,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.1,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2005-03-05T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://secunia.com/advisories/15348",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://secunia.com/advisories/18165",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "http://securitytracker.com/id?1013967",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.daemonology.net/hyperthreading-considered-harmful/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.daemonology.net/papers/htt.pdf",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/911878",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-476.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-800.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/12724",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2005/0540",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2005/3002",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://secunia.com/advisories/15348",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://secunia.com/advisories/18165",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "http://securitytracker.com/id?1013967",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.daemonology.net/hyperthreading-considered-harmful/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.daemonology.net/papers/htt.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/911878",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-476.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-800.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/12724",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2005/0540",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2005/3002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2009-09-21 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
Impacted products
Vendor Product Version
postfix postfix 2.5.5
debian debian_linux 6.06
ubuntu ubuntu_linux 4.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "894002C8-F3C1-4241-96FE-C088BBD0FCED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:6.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "67D47FA7-B5AF-4580-8BA7-8408D98D1F26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22916E8-84BE-444D-9B99-199FE8E0F665",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.",
      },
      {
         lang: "es",
         value: "El script postfix.postinst en el paquete postfix v2.5.5 de Debian GNU/Linux y Ubuntu permite acceso de escritura al usuario postfix en /var/spool/postfix/pid, permitiendo a usuarios locales dirigir ataques de enlaces simbólicos que sobrescriban ficheros de su elección.",
      },
   ],
   id: "CVE-2009-2939",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2009-09-21T19:30:00.390",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2011/dsa-2233",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/09/18/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2011/dsa-2233",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/09/18/6",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B7EED3-88ED-4959-9B0D-4593F82B482C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:1.5.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "9651929E-7E3D-4967-B4EC-BC1D87386A5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B03A2FFF-D736-436F-AB01-952C90CC88A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.0.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "686E6850-2FFB-4A83-9BBB-9C4FB456294E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "941DD616-2910-4B61-89E5-5DDAE8E930A2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en proxyd de Cyrus IMAP Server 2.2.9 y anteriores, con la opción imapmagicplus establecida, puede permitir a atacantes remotos ejecutar código de su elección, una vulnerabilidad distinta de CAN-2004-1011.",
      },
   ],
   id: "CVE-2004-1015",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145",
      },
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2008-11-17 18:18
Modified
2025-04-09 00:30
Severity ?
Summary
Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:dcgrendel:vmbuilder:0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "131A9ABC-41B8-42D4-871C-5375D413F1FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:_nil_:lts:*:*:*:*:*",
                     matchCriteriaId: "8CC514F1-FFCF-4ADD-8A2C-F22C693F9DCF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.04:_nil_:lts:*:*:*:*:*",
                     matchCriteriaId: "3DD8F0EE-8DD3-4399-83E4-AD4FC89A1DCD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED67B852-4B37-4B79-8F4D-23B2FEACA4ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.",
      },
      {
         lang: "es",
         value: "Ubuntu 6.06 LTS, 7.10, 8.04 LTS y 8.10, cuando está instalado como una máquina virtual por (1) python-vm-builder o (2) ubuntu-vm-builder en VMBuilder 0.9 en Ubuntu 8.10, tiene un ! (signo de exclamación) como la contraseña por defecto de root, lo que permite a atacantes remotos evitar las restricciones de login previstas.",
      },
   ],
   id: "CVE-2008-5104",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2008-11-17T18:18:48.063",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://secunia.com/advisories/32697",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/32292",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-670-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://secunia.com/advisories/32697",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/32292",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-670-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-255",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-08-30 22:17
Modified
2025-04-09 00:30
Severity ?
Summary
A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 7.04



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A940B9-A553-4A0B-8ECF-52FD26894285",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.",
      },
      {
         lang: "es",
         value: "Un error de regresión en tcp-wrappers versiones 7.6.dbs-10 y 7.6.dbs-11, podría permitir a atacantes remotos omitir las restricciones de acceso previstas cuando un servicio usa la biblioteca libwrap pero no especifica la información de conexión del servidor.",
      },
   ],
   id: "CVE-2007-4601",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-08-30T22:17:00.000",
   references: [
      {
         source: "security@ubuntu.com",
         url: "http://bugs.debian.org/405342",
      },
      {
         source: "security@ubuntu.com",
         url: "http://osvdb.org/40140",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/26567",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-507-1",
      },
      {
         source: "security@ubuntu.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364",
      },
      {
         source: "security@ubuntu.com",
         url: "https://launchpad.net/bugs/135332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.debian.org/405342",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/40140",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26567",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-507-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://launchpad.net/bugs/135332",
      },
   ],
   sourceIdentifier: "security@ubuntu.com",
   vendorComments: [
      {
         comment: "Not vulnerable. This issue was specific to a patch from Debian project and did not affect versions of tcp_wrappers packages as shipped with Red Hat Enterprise Linux.\n",
         lastModified: "2007-08-31T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.
References
secalert@redhat.comftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
secalert@redhat.comhttp://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlPatch
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2006-0177.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://scary.beasts.org/security/CESA-2005-003.txtExploit, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18147
secalert@redhat.comhttp://secunia.com/advisories/18303Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18312Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18313Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18329Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18332Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18334
secalert@redhat.comhttp://secunia.com/advisories/18338Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18349Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18373
secalert@redhat.comhttp://secunia.com/advisories/18375Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18380
secalert@redhat.comhttp://secunia.com/advisories/18385Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18387Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18389Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18398Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18407Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18414
secalert@redhat.comhttp://secunia.com/advisories/18416Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18423Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18425
secalert@redhat.comhttp://secunia.com/advisories/18428
secalert@redhat.comhttp://secunia.com/advisories/18436
secalert@redhat.comhttp://secunia.com/advisories/18448Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18463
secalert@redhat.comhttp://secunia.com/advisories/18517Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18534Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18554Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18582Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18642Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18644Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18674Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18675Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18679Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18908
secalert@redhat.comhttp://secunia.com/advisories/18913Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/19230
secalert@redhat.comhttp://secunia.com/advisories/19377
secalert@redhat.comhttp://secunia.com/advisories/25729
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-931
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-932
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-937
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-938
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-940
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-936Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-950Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-961Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-962Patch, Vendor Advisory
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200601-17.xmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.kde.org/info/security/advisory-20051207-2.txtPatch, Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:003
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:004
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:005
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:006
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:008
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:010
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:011
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:012
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0160.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0163.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/427053/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/427990/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/16143Patch
secalert@redhat.comhttp://www.trustix.org/errata/2006/0002/
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/0047
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2280
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/24022
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
secalert@redhat.comhttps://usn.ubuntu.com/236-1/
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2006-0177.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://scary.beasts.org/security/CESA-2005-003.txtExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18147
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18303Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18312Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18313Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18329Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18332Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18334
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18338Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18349Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18373
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18375Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18380
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18385Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18387Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18389Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18398Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18407Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18414
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18416Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18423Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18425
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18428
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18436
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18448Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18463
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18517Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18534Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18554Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18582Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18642Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18644Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18674Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18675Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18679Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18908
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18913Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19230
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19377
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25729
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-931
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-932
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-937
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-938
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-940
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-936Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-950Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-961Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-962Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-17.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kde.org/info/security/advisory-20051207-2.txtPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0160.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0163.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427053/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427990/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16143Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0002/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0047
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2280
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/24022
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/236-1/
Impacted products
Vendor Product Version
easy_software_products cups 1.1.22
easy_software_products cups 1.1.22_rc1
easy_software_products cups 1.1.23
easy_software_products cups 1.1.23_rc1
kde kdegraphics 3.2
kde kdegraphics 3.4.3
kde koffice 1.4
kde koffice 1.4.1
kde koffice 1.4.2
kde kpdf 3.2
kde kpdf 3.4.3
kde kword 1.4.2
libextractor libextractor *
poppler poppler 0.4.2
sgi propack 3.0
tetex tetex 1.0.7
tetex tetex 2.0
tetex tetex 2.0.1
tetex tetex 2.0.2
tetex tetex 3.0
xpdf xpdf 3.0
conectiva linux 10.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
gentoo linux *
mandrakesoft mandrake_linux 10.1
mandrakesoft mandrake_linux 10.1
mandrakesoft mandrake_linux 10.2
mandrakesoft mandrake_linux 10.2
mandrakesoft mandrake_linux 2006
mandrakesoft mandrake_linux 2006
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 3.0
mandrakesoft mandrake_linux_corporate_server 3.0
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux_desktop 3.0
redhat enterprise_linux_desktop 4.0
redhat fedora_core core_1.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat fedora_core core_4.0
redhat linux 7.3
redhat linux 9.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
sco openserver 5.0.7
sco openserver 6.0
slackware slackware_linux 9.0
slackware slackware_linux 9.1
slackware slackware_linux 10.0
slackware slackware_linux 10.1
slackware slackware_linux 10.2
suse suse_linux 1.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.1
suse suse_linux 9.1
suse suse_linux 9.2
suse suse_linux 9.2
suse suse_linux 9.2
suse suse_linux 9.3
suse suse_linux 9.3
suse suse_linux 9.3
suse suse_linux 10.0
suse suse_linux 10.0
trustix secure_linux 2.0
trustix secure_linux 2.2
trustix secure_linux 3.0
turbolinux turbolinux 10
turbolinux turbolinux fuji
turbolinux turbolinux_appliance_server 1.0_hosting_edition
turbolinux turbolinux_appliance_server 1.0_workgroup_edition
turbolinux turbolinux_desktop 10.0
turbolinux turbolinux_home *
turbolinux turbolinux_multimedia *
turbolinux turbolinux_personal *
turbolinux turbolinux_server 8.0
turbolinux turbolinux_server 10.0
turbolinux turbolinux_server 10.0_x86
turbolinux turbolinux_workstation 8.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "787B918D-9CCC-44FE-92AF-E8DF1E91A3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "C116493B-2837-4531-9291-A9FF03099A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "525BD04B-387F-4713-BC89-472D0D0BCFD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BF92649-90CE-4E75-A938-61D0916B5A7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CA505B4-0C17-49C8-9533-CA8CE3AA77D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "37C08E0A-651F-458B-BCEC-A30DCD527E47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6000D6AF-C056-4BC0-A54C-72E23E52AB92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D036E4-FA49-417D-968B-9D73B16A09BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC2AB9CB-DEAB-45AB-A7CA-D19E069907EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAC32BAA-99B3-4B40-83A3-ED9E1B12B295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "679D9520-DE8E-4D06-A227-3B1C1D05977D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*",
                     matchCriteriaId: "EF8ABD90-AD2B-4FA0-A355-9D7CD6D3C486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9178B36F-41D5-4AE7-B9C8-56BDEADE76EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
                     matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
                     matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "AF8AE8C4-810F-41AB-A251-5A2D4DD6884D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*",
                     matchCriteriaId: "5EACF214-FA27-44FF-A431-927AB79377A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "E2B58895-0E2A-4466-9CB2-0083349A83B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "03F8220A-9B1C-40AA-AEAB-F9A93225FBD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "2311919C-7864-469D-B0F6-9B11D8D0A1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "19876495-4C1A-487C-955A-C5AA46362A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*",
                     matchCriteriaId: "D75286DD-50BC-4B72-8AC8-E20730124DC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "1998C972-497E-4916-B50E-FB32303EEA8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "A6CD3DD9-3A8A-4716-A2D1-136A790AFF94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "6CE2020A-4FB2-4FCD-8561-7BD147CD95EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "08E90AFA-C262-46D0-B60E-26B67C9602D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "0315FB43-D199-4734-B724-50ED031C0020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D69B83-4EF3-407B-8E8C-DE623F099C17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "7D221688-18A0-453D-8D13-6B68011FCA13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*",
                     matchCriteriaId: "597094EC-D23F-4EC4-A140-96F287679124",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "C4FCF0D3-A6CB-448E-B0D3-DA82BE02DEC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C720DACC-CF4B-4A00-818C-8303A7D7DED6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
                     matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7458BA31-812E-40C9-BB92-8688A3BCBA56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29C5A03-A7C9-4780-BB63-CF1E874D018D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "70440F49-AEE9-41BE-8E1A-43AB657C8E09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02EE2D72-B1E6-4380-80B0-E40A23DDD115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*",
                     matchCriteriaId: "F239BA8A-6B41-4B08-8C7C-25D235812C50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*",
                     matchCriteriaId: "89BA858B-9466-4640-84AE-DC5BDC65D6B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*",
                     matchCriteriaId: "85F2D904-E830-4034-9CCB-0FF65019622C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*",
                     matchCriteriaId: "3EA56868-ACA1-4C65-9FFB-A68129D2428A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*",
                     matchCriteriaId: "1BA2E629-58C6-4BA0-A447-F8F570B35E74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "D5F98B9A-880E-45F0-8C16-12B22970F0D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*",
                     matchCriteriaId: "3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*",
                     matchCriteriaId: "C89BA3B6-370B-4911-A363-935A9C9EACF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*",
                     matchCriteriaId: "4F1B4D15-0562-44D6-B80B-35A8F432BD41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*",
                     matchCriteriaId: "D84ABF78-0D85-4E15-907E-B5ACE86EB8C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "9C7018E7-F90C-435D-A07A-05A294EA2827",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*",
                     matchCriteriaId: "16915004-1006-41D6-9E42-D1A5041E442D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*",
                     matchCriteriaId: "994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "100A2456-BF20-4461-8DC9-C61889322B29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C7D4F57-E186-497A-B390-92E5D2C7E894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC3F6F3-9A6E-4A98-A967-6776C872475C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3218DD-A565-4AB8-86FE-E7F59AC0535F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*",
                     matchCriteriaId: "97AEDB57-202F-4B53-8815-21836F177060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E27180A1-9767-4CD3-978C-7538155B162D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAAA9376-A060-49AE-86A7-6B28E26ED5D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B484D091-62DE-4EF2-AC54-26896CA8B315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5AC26E-3F3F-4D14-BE65-82B4432AB382",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.",
      },
   ],
   id: "CVE-2005-3624",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-12-31T05:00:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://scary.beasts.org/security/CESA-2005-003.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18147",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18303",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18312",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18313",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18329",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18332",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18334",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18338",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18349",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18373",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18375",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18380",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18385",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18387",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18389",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18398",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18407",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18414",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18416",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18423",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18425",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18428",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18436",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18448",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18463",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18517",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18534",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18554",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18582",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18642",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18644",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18674",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18675",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18679",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18908",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18913",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/19230",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/19377",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25729",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-931",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-932",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-937",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-938",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-940",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-936",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-950",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-961",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-962",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/16143",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.trustix.org/errata/2006/0002/",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/0047",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/2280",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437",
      },
      {
         source: "secalert@redhat.com",
         url: "https://usn.ubuntu.com/236-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://scary.beasts.org/security/CESA-2005-003.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18147",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18303",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18312",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18313",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18329",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18334",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18349",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18373",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18375",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18380",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18385",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18387",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18389",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18398",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18407",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18414",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18416",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18423",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18425",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18428",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18436",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18448",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18463",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18517",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18534",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18554",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18582",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18642",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18644",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18674",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18675",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18679",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18908",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18913",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19230",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19377",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25729",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-931",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-932",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-937",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-938",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-940",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-936",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-950",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-961",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-962",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/16143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2006/0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/0047",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/2280",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/236-1/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-189",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-03-15 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.
References
security@debian.orghttp://secunia.com/advisories/20163
security@debian.orghttp://secunia.com/advisories/20202
security@debian.orghttp://secunia.com/advisories/20338
security@debian.orghttp://www.debian.org/security/2006/dsa-1067
security@debian.orghttp://www.debian.org/security/2006/dsa-1069
security@debian.orghttp://www.debian.org/security/2006/dsa-1070
security@debian.orghttp://www.debian.org/security/2006/dsa-1082
security@debian.orghttp://www.novell.com/linux/security/advisories/2005_18_kernel.htmlVendor Advisory
security@debian.orghttp://www.redhat.com/support/errata/RHSA-2005-283.htmlVendor Advisory
security@debian.orghttp://www.redhat.com/support/errata/RHSA-2005-284.htmlVendor Advisory
security@debian.orghttp://www.redhat.com/support/errata/RHSA-2005-293.html
security@debian.orghttp://www.redhat.com/support/errata/RHSA-2005-366.html
security@debian.orghttp://www.securityfocus.com/bid/12810
security@debian.orghttp://www.trustix.org/errata/2005/0009/Vendor Advisory
security@debian.orghttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
security@debian.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562
security@debian.orghttps://usn.ubuntu.com/95-1/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20163
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20202
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20338
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1067
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1069
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1070
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1082
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_18_kernel.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-283.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-284.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-293.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-366.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12810
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2005/0009/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/95-1/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2:*:*:*:*:*:*:*",
                     matchCriteriaId: "39B3D5AE-05A8-433C-98DD-2711423D3FA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C62EF915-CA7C-4D75-BC67-E015772BB9CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.",
      },
   ],
   id: "CVE-2005-0384",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-03-15T05:00:00.000",
   references: [
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
      },
      {
         source: "security@debian.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
      },
      {
         source: "security@debian.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
      },
      {
         source: "security@debian.org",
         url: "http://www.securityfocus.com/bid/12810",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.trustix.org/errata/2005/0009/",
      },
      {
         source: "security@debian.org",
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
      },
      {
         source: "security@debian.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562",
      },
      {
         source: "security@debian.org",
         url: "https://usn.ubuntu.com/95-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/12810",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.trustix.org/errata/2005/0009/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/95-1/",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B7EED3-88ED-4959-9B0D-4593F82B482C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:1.5.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "9651929E-7E3D-4967-B4EC-BC1D87386A5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B03A2FFF-D736-436F-AB01-952C90CC88A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.0.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "686E6850-2FFB-4A83-9BBB-9C4FB456294E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "941DD616-2910-4B61-89E5-5DDAE8E930A2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.",
      },
      {
         lang: "es",
         value: "Error de fuera-por-uno en la función myasl_canon_user en Cyrus IMAP Server 2.2.9 y anteriores conduce a un desbordamiento de búfer, lo que puede permitir a atacantes remotos ejecutar código de su elección mediante el nombre de usuario.",
      },
   ],
   id: "CVE-2004-1067",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11738",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-37-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11738",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-37-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-04-06 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
References
secalert@redhat.comhttp://issues.foresightlinux.org/browse/FL-223
secalert@redhat.comhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
secalert@redhat.comhttp://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
secalert@redhat.comhttp://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2007-0125.html
secalert@redhat.comhttp://secunia.com/advisories/24741Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24745
secalert@redhat.comhttp://secunia.com/advisories/24756Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24758
secalert@redhat.comhttp://secunia.com/advisories/24765
secalert@redhat.comhttp://secunia.com/advisories/24770Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24771
secalert@redhat.comhttp://secunia.com/advisories/24772
secalert@redhat.comhttp://secunia.com/advisories/24791
secalert@redhat.comhttp://secunia.com/advisories/25004
secalert@redhat.comhttp://secunia.com/advisories/25006
secalert@redhat.comhttp://secunia.com/advisories/25195
secalert@redhat.comhttp://secunia.com/advisories/25216
secalert@redhat.comhttp://secunia.com/advisories/25305
secalert@redhat.comhttp://secunia.com/advisories/33937
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200705-10.xml
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
secalert@redhat.comhttp://support.apple.com/kb/HT3438
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1294
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:079
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:080
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2007_27_x.html
secalert@redhat.comhttp://www.openbsd.org/errata39.html#021_xorg
secalert@redhat.comhttp://www.openbsd.org/errata40.html#011_xorg
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0126.htmlVendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0132.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/464686/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/464816/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/23283
secalert@redhat.comhttp://www.securityfocus.com/bid/23300
secalert@redhat.comhttp://www.securitytracker.com/id?1017857
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-448-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1217
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1548
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/33419
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1213
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
af854a3a-2127-422b-91ae-364da2661108http://issues.foresightlinux.org/browse/FL-223
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2007-0125.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24741Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24745
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24756Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24758
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24765
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24770Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24771
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24772
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24791
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25004
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25006
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25195
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25305
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33937
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200705-10.xml
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3438
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1294
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_27_x.html
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata39.html#021_xorg
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata40.html#011_xorg
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0126.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0132.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/464686/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/464816/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23283
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23300
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017857
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-448-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1217
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1548
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33419
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1213
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
Impacted products
Vendor Product Version
mandrakesoft mandrake_linux 9.1
mandrakesoft mandrake_linux 9.1
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 2007
mandrakesoft mandrake_linux 2007
mandrakesoft mandrake_linux_corporate_server 3.0
mandrakesoft mandrake_linux_corporate_server 3.0
mandrakesoft mandrake_linux_corporate_server 4.0
mandrakesoft mandrake_linux_corporate_server 4.0
mandrakesoft mandrake_multi_network_firewall 2.0
x.org libxfont 1.2.2
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux_desktop 3.0
redhat enterprise_linux_desktop 4.0
redhat enterprise_linux_desktop 5.0
redhat enterprise_linux_desktop 5.0
redhat fedora_core core_1.0
redhat linux 9.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
slackware slackware_linux 9.0
slackware slackware_linux 9.1
slackware slackware_linux current
turbolinux turbolinux_desktop 10.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 6.10
rpath linux 1
openbsd openbsd 3.9
openbsd openbsd 4.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AD30B9-8FBA-48B3-B2B2-014C950B9BAA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "279317B9-AF2F-43E9-BEE5-518FC6D23A87",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*",
                     matchCriteriaId: "02362C25-B373-4FB1-AF4A-2AFC7F7D4387",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "19AD5F8D-6EB9-4E4B-9E82-FFBAB68797E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F65351-C2DA-41C0-A3F9-1AE951E4386E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "1B795F9F-AFB3-4A2A-ABC6-9246906800DE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "77FF1412-A7DA-4669-8AE1-5A529AB387FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFADBA5A-8168-40B8-B5CA-0F1F7F9193D2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*",
                     matchCriteriaId: "13B6DE5F-3143-4C63-8D8D-4679CF0F9DC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*",
                     matchCriteriaId: "50988CF6-07E5-44BA-81C2-C33DD8E7151B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
                     matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1CB2DD9-E77F-46EE-A145-F87AD10EA8E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*",
                     matchCriteriaId: "49F400D5-4CA7-4F7D-818B-DEBF58DEB113",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "EF15862D-6108-4791-8817-622123C8D10C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "F1672825-AB87-4402-A628-B33AE5B7D4C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*",
                     matchCriteriaId: "939216D8-9E6C-419E-BC0A-EC7F0F29CE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "E520564E-964D-4758-945B-5EF0C35E605C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "2294D5A7-7B36-497A-B0F1-514BC49E1423",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "AB80939E-8B58-48B6-AFB7-9CF518C0EE1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "61B11116-FA94-4989-89A1-C7B551D5195A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2B66383-4124-4579-BC8E-36DBE7ABB543",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC77812C-D84E-493E-9D21-1BA6C2129E70",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.",
      },
      {
         lang: "es",
         value: "Desbordamiento de entero en la función FontFileInitTable en X.Org libXfont versiones anteriores a 20070403 permite a usuarios remotos autenticados ejecutar código de su elección mediante una primera línea larga en el fichero fonts.dir, lo cual resulta en un desbordamiento de montón.",
      },
   ],
   evaluatorSolution: "The vendor has addressed this vulnerability in the following product update: http://xorg.freedesktop.org/archive/X11R7.2/patches/",
   id: "CVE-2007-1352",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "ADJACENT_NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.8,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:M/Au:S/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 4.4,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-04-06T01:19:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://issues.foresightlinux.org/browse/FL-223",
      },
      {
         source: "secalert@redhat.com",
         url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24741",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24745",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24756",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24758",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24765",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24770",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24771",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24772",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24791",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25004",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25006",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25195",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25216",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25305",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/33937",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.apple.com/kb/HT3438",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2007/dsa-1294",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openbsd.org/errata39.html#021_xorg",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openbsd.org/errata40.html#011_xorg",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/23283",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/23300",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securitytracker.com/id?1017857",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/usn-448-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/1217",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/1548",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419",
      },
      {
         source: "secalert@redhat.com",
         url: "https://issues.rpath.com/browse/RPL-1213",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://issues.foresightlinux.org/browse/FL-223",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24741",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24745",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24756",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24758",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24765",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24770",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24771",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24772",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24791",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25004",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25006",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25195",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25216",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25305",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33937",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.apple.com/kb/HT3438",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2007/dsa-1294",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openbsd.org/errata39.html#021_xorg",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openbsd.org/errata40.html#011_xorg",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/23283",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/23300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1017857",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-448-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/1217",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/1548",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.rpath.com/browse/RPL-1213",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923
cve@mitre.orghttp://fedoranews.org/updates/FEDORA--.shtml
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109913064629327&w=2
cve@mitre.orghttp://secunia.com/advisories/30914Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30967Vendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200410-15.xml
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-591.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/11385Patch, Vendor Advisory
cve@mitre.orghttp://www.squid-cache.org/Advisories/SQUID-2004_3.txt
cve@mitre.orghttp://www.squid-cache.org/Advisories/SQUID-2008_1.txt
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1969/referencesVendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17688
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA--.shtml
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109913064629327&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30914Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30967Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-591.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11385Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.squid-cache.org/Advisories/SQUID-2004_3.txt
af854a3a-2127-422b-91ae-364da2661108http://www.squid-cache.org/Advisories/SQUID-2008_1.txt
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1969/referencesVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17688
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html
Impacted products
Vendor Product Version
openpkg openpkg 2.1
openpkg openpkg 2.2
openpkg openpkg current
squid squid 2.0_patch2
squid squid 2.1_patch2
squid squid 2.3_.stable4
squid squid 2.3_.stable5
squid squid 2.4
squid squid 2.4_.stable2
squid squid 2.4_.stable6
squid squid 2.4_.stable7
squid squid 2.5_.stable1
squid squid 2.5_.stable3
squid squid 2.5_.stable4
squid squid 2.5_.stable5
squid squid 2.5_.stable6
squid squid 3.0_pre1
squid squid 3.0_pre2
squid squid 3.0_pre3
gentoo linux *
redhat fedora_core core_2.0
trustix secure_linux 1.5
trustix secure_linux 2.0
trustix secure_linux 2.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "37042CDE-E4FE-442E-891A-CD84433D36E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F6E348-01DF-4FA4-808E-39A2A7A2B97B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.0_patch2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0AA7680-E004-44AC-9AE9-C0186459C4B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.1_patch2:*:*:*:*:*:*:*",
                     matchCriteriaId: "05A4829D-4DC1-4CD2-B136-48719A254EA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.3_.stable4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A6BFB6A-0AFC-4E52-AD48-252E741B683B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.3_.stable5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9797A37-FD26-4527-B2FA-E458F7A88D9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "540AA8A9-A4AB-4DB2-B37E-11876348DF3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.4_.stable2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8F697BB-5C94-42CD-AD9E-72C3D3675D27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.4_.stable6:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE764CDC-1018-4502-8F41-8A48E38E7AAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.4_.stable7:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CBAAC5B-6012-410F-B765-689A8D55B095",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.5_.stable1:*:*:*:*:*:*:*",
                     matchCriteriaId: "62C66D46-D3C7-4FCC-B80D-EBA542E77C13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.5_.stable3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0B6C02F-D194-4CA7-9DEC-A436A4E8C99C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.5_.stable4:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B7D86CB-EEAD-4C40-855D-E98E4ED8B58F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.5_.stable5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F59C3E7-0AC0-4886-B4B4-56904AC93C55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:2.5_.stable6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5207FB50-946A-4AB2-AED9-9BA78B88F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:3.0_pre1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF89643B-169C-4ECD-B905-F4FE7F37030D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:3.0_pre2:*:*:*:*:*:*:*",
                     matchCriteriaId: "631B754D-1EB0-4A64-819A-5A24E7D0ADFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid:squid:3.0_pre3:*:*:*:*:*:*:*",
                     matchCriteriaId: "95AB69CF-AD54-4D30-A9C5-4253855A760F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.",
      },
   ],
   id: "CVE-2004-0918",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-27T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923",
      },
      {
         source: "cve@mitre.org",
         url: "http://fedoranews.org/updates/FEDORA--.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30914",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30967",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-591.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11385",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2008/1969/references",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://fedoranews.org/updates/FEDORA--.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30914",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30967",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-591.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11385",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2008/1969/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
cve@mitre.orghttp://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
cve@mitre.orghttp://secunia.com/advisories/18684
cve@mitre.orghttp://secunia.com/advisories/19038
cve@mitre.orghttp://secunia.com/advisories/19369
cve@mitre.orghttp://secunia.com/advisories/19607
cve@mitre.orghttp://secunia.com/advisories/21476
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1018
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200408-24.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:022
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-293.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0190.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0191.html
cve@mitre.orghttp://www.securityfocus.com/bid/11052
cve@mitre.orghttp://www.securityfocus.com/bid/11937Patch, Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17151
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427
cve@mitre.orghttps://usn.ubuntu.com/38-1/
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18684
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19038
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19369
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19607
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21476
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1018
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-293.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0190.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0191.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11052
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11937Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17151
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/38-1/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.",
      },
      {
         lang: "es",
         value: "Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline.",
      },
   ],
   id: "CVE-2004-1058",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 1.2,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:H/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18684",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/19038",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/19369",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/19607",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/21476",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1018",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/11052",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11937",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427",
      },
      {
         source: "cve@mitre.org",
         url: "https://usn.ubuntu.com/38-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18684",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19038",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19369",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19607",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/21476",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1018",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/11052",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11937",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/38-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109880927526773&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110815379627883&w=2
cve@mitre.orghttp://www.debian.org/security/2004/dsa-573
cve@mitre.orghttp://www.debian.org/security/2004/dsa-581
cve@mitre.orghttp://www.debian.org/security/2004/dsa-599
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:113
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:114
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:115
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:116
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-543.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-592.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-066.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-354.html
cve@mitre.orghttp://www.securityfocus.com/bid/11501Patch, Vendor Advisory
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2353
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17818
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714
cve@mitre.orghttps://www.ubuntu.com/usn/usn-9-1/
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109880927526773&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110815379627883&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-573
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-581
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-599
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:114
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:115
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:116
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-543.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-592.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-066.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-354.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11501Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2353
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-9-1/
Impacted products
Vendor Product Version
easy_software_products cups 1.0.4
easy_software_products cups 1.0.4_8
easy_software_products cups 1.1.1
easy_software_products cups 1.1.4
easy_software_products cups 1.1.4_2
easy_software_products cups 1.1.4_3
easy_software_products cups 1.1.4_5
easy_software_products cups 1.1.6
easy_software_products cups 1.1.7
easy_software_products cups 1.1.10
easy_software_products cups 1.1.12
easy_software_products cups 1.1.13
easy_software_products cups 1.1.14
easy_software_products cups 1.1.15
easy_software_products cups 1.1.16
easy_software_products cups 1.1.17
easy_software_products cups 1.1.18
easy_software_products cups 1.1.19
easy_software_products cups 1.1.19_rc5
easy_software_products cups 1.1.20
gnome gpdf 0.112
gnome gpdf 0.131
kde koffice 1.3
kde koffice 1.3.1
kde koffice 1.3.2
kde koffice 1.3.3
kde koffice 1.3_beta1
kde koffice 1.3_beta2
kde koffice 1.3_beta3
kde kpdf 3.2
pdftohtml pdftohtml 0.32a
pdftohtml pdftohtml 0.32b
pdftohtml pdftohtml 0.33
pdftohtml pdftohtml 0.33a
pdftohtml pdftohtml 0.34
pdftohtml pdftohtml 0.35
pdftohtml pdftohtml 0.36
tetex tetex 1.0.7
tetex tetex 2.0
tetex tetex 2.0.1
tetex tetex 2.0.2
xpdf xpdf 0.90
xpdf xpdf 0.91
xpdf xpdf 0.92
xpdf xpdf 0.93
xpdf xpdf 1.0
xpdf xpdf 1.0a
xpdf xpdf 1.1
xpdf xpdf 2.0
xpdf xpdf 2.1
xpdf xpdf 2.3
xpdf xpdf 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
gentoo linux *
kde kde 3.2
kde kde 3.2.1
kde kde 3.2.2
kde kde 3.2.3
kde kde 3.3
kde kde 3.3.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat fedora_core core_2.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
suse suse_linux 8.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "68BD578F-CCAD-4515-9205-EB4F297C6DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "734D0C2C-F71F-461A-87EE-202C6B706753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F0F402D-5CD0-4477-8B59-C753CECB02BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*",
                     matchCriteriaId: "959F7AFA-ED20-434C-993F-06C2A8574662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4F5A0A4-2884-46CA-A846-8B954EB80CFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "35E65857-12C7-49DE-AD27-3CACD456231C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "47CEF035-57A6-470B-916A-E5562C28E866",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E26BB15-4CF8-4496-A7F7-EB34C444EF72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "D414984E-4F6B-4278-8346-968587E4B18E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "33C36DCB-2FDD-44E6-85E8-875575AAE69E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4B7C23-0C54-4FBA-A774-9CC1E148376E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "A786A770-919E-4E23-949D-D836F316618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "00A2249C-73DE-434E-A41F-4EDB0ADC0845",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*",
                     matchCriteriaId: "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB7653F1-70E2-423F-A6A9-30333644B506",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E70576E-C253-4F8B-A93E-14CC2EE7114D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*",
                     matchCriteriaId: "832C5512-B473-40E8-BF4F-EC6ABFE46749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "053435DD-BFDF-4C39-9919-11C42D569085",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9BB1A3C-3348-4545-A513-E504B33F72AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD45E2C8-0B0E-484F-8050-94BF77798183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EAA654E-9DD4-4614-92D7-EF4D676B3A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*",
                     matchCriteriaId: "89C96FC9-40DB-467D-A701-49F97A1B887D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*",
                     matchCriteriaId: "76128BDC-2CA7-4AE7-8C4F-BCB3835CA938",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B2517C7-27EF-4961-91C3-CA33219AFF2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE346726-71D6-438B-B600-A7E107332816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*",
                     matchCriteriaId: "87E85020-B4DB-4011-BDD0-1C8967D45A84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*",
                     matchCriteriaId: "8189A9AB-F685-40E2-944F-8BD3DD6FA0A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*",
                     matchCriteriaId: "C33B8585-FA5F-4210-A997-615BCEE1726F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4AE4C34-C497-426F-AC0D-1805A50582EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2989EFF-07B9-4EF2-B6C1-59E4F52FDC92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3970101-5E83-49FD-BCB6-D9176D46B5A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CC6233-E207-40CC-81FF-A8670EEA4295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*",
                     matchCriteriaId: "0304E1E3-8766-40D0-8879-A652B4E9E72D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*",
                     matchCriteriaId: "188F1343-8082-4B54-8DA4-E344818ABD52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "354487CF-0086-4AE2-872B-0032E3EB89EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1169B802-7279-437F-AF59-621A67DC92EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
                     matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
                     matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82F69843-978D-4686-BC5B-1D09DA4A21BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACEE0AED-7918-41E9-A902-AC4070E03132",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E19472-47B4-4398-A188-CA5A5D3E7060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D17407A2-089E-43A5-9BD5-EFF966F5CC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C4B436D-8D6A-473E-B707-26147208808B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E26B353-4985-4116-B97A-5767CDC732F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.",
      },
   ],
   id: "CVE-2004-0888",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-27T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2004/dsa-573",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2004/dsa-581",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2004/dsa-599",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-543.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-592.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-066.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-354.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11501",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-9-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2004/dsa-573",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2004/dsa-581",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2004/dsa-599",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-543.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-592.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-066.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-354.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11501",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-9-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
References
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005/May/msg00001.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110028877431192&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110598298225675&w=2
cve@mitre.orghttp://www.debian.org/security/2004/dsa-596
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:133
cve@mitre.orghttp://www.securityfocus.com/bid/11668Patch, Vendor Advisory
cve@mitre.orghttp://www.sudo.ws/sudo/alerts/bash_functions.html
cve@mitre.orghttp://www.trustix.org/errata/2004/0061/
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18055
cve@mitre.orghttps://www.ubuntu.com/usn/usn-28-1/
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110028877431192&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110598298225675&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-596
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:133
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11668Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.sudo.ws/sudo/alerts/bash_functions.html
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0061/
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18055
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-28-1/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4F3F3BB-E004-4FD9-9580-F2D5F3ED3701",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6060C8CB-1592-479E-86AD-AC180F855BD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6DAA88C-BADD-405A-9E66-5B0839595A70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "04D5E3B7-5377-4CA8-BA0D-056870CB717E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C11931-B594-43EC-9698-7152B1DF8CA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "976B5923-1BCC-4DE6-A904-930DD833B937",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5452DF1-0270-452D-90EB-45E9A084B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFD12E6-F92E-4371-ADA7-BCD41E4C9014",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "67FDF4FB-06FA-4A10-A3CF-F52169BC8072",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5B29018-B495-482A-8FF7-66821A178F9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*",
                     matchCriteriaId: "38718561-70C7-4E0D-9313-87A5E82ED338",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D057064A-9B34-4224-97BA-4D5840A92BE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3C297DC-69B1-4BE6-A5EF-D320BD0CA968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F4C1FFB-F6AA-4DED-9C54-DCB274F59A44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*",
                     matchCriteriaId: "338A92AC-92D2-40BF-9FAC-884AF6F74D55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*",
                     matchCriteriaId: "26DB5610-03CE-425E-8855-70D5787029FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5DFC86C-7743-4F27-BC10-170F04C23D7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5170421-BA0C-4365-9CD6-BD232EA08680",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5909AAA4-4AF9-4D23-87C5-5D7787909B02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2170CFD0-2594-45FB-B68F-0A75114F00A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*",
                     matchCriteriaId: "03C07744-CAE8-44C6-965E-2A09BAE1F36C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17E0E59-C928-49AB-BAA7-4AE638B376D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "294FC65B-4225-475A-B49A-758823CEDECD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "6156B085-AA17-458C-AED1-D658275E43B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6419309-385F-4525-AD4B-C73B1A3ED935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F7E821-2908-47F1-9665-E9D68ECC242F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
                     matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
                     matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "9E661D58-18DF-4CCF-9892-F873618F4535",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "sudo before 1.6.8p2 allows local users to execute arbitrary commands by using \"()\" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.",
      },
   ],
   id: "CVE-2004-1051",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-03-01T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2004/dsa-596",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11668",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.sudo.ws/sudo/alerts/bash_functions.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2004/0061/",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-28-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2004/dsa-596",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11668",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.sudo.ws/sudo/alerts/bash_functions.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2004/0061/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-28-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "We do not consider this to be a security issue:\nhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=139478#c1",
         lastModified: "2006-08-30T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gnu:realtime_linux_security_module:0.8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D5094E9-4464-471D-AA5E-E4B4B7A7F1CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.",
      },
   ],
   id: "CVE-2004-1337",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-12-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/12093",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/12093",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
Impacted products
Vendor Product Version
easy_software_products cups 1.0.4
easy_software_products cups 1.0.4_8
easy_software_products cups 1.1.1
easy_software_products cups 1.1.4
easy_software_products cups 1.1.4_2
easy_software_products cups 1.1.4_3
easy_software_products cups 1.1.4_5
easy_software_products cups 1.1.6
easy_software_products cups 1.1.7
easy_software_products cups 1.1.10
easy_software_products cups 1.1.12
easy_software_products cups 1.1.13
easy_software_products cups 1.1.14
easy_software_products cups 1.1.15
easy_software_products cups 1.1.16
easy_software_products cups 1.1.17
easy_software_products cups 1.1.18
easy_software_products cups 1.1.19
easy_software_products cups 1.1.19_rc5
easy_software_products cups 1.1.20
gnome gpdf 0.112
gnome gpdf 0.131
kde koffice 1.3
kde koffice 1.3.1
kde koffice 1.3.2
kde koffice 1.3.3
kde koffice 1.3_beta1
kde koffice 1.3_beta2
kde koffice 1.3_beta3
kde kpdf 3.2
pdftohtml pdftohtml 0.32a
pdftohtml pdftohtml 0.32b
pdftohtml pdftohtml 0.33
pdftohtml pdftohtml 0.33a
pdftohtml pdftohtml 0.34
pdftohtml pdftohtml 0.35
pdftohtml pdftohtml 0.36
tetex tetex 1.0.7
tetex tetex 2.0
tetex tetex 2.0.1
tetex tetex 2.0.2
xpdf xpdf 0.90
xpdf xpdf 0.91
xpdf xpdf 0.92
xpdf xpdf 0.93
xpdf xpdf 1.0
xpdf xpdf 1.0a
xpdf xpdf 1.1
xpdf xpdf 2.0
xpdf xpdf 2.1
xpdf xpdf 2.3
xpdf xpdf 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
gentoo linux *
kde kde 3.2
kde kde 3.2.1
kde kde 3.2.2
kde kde 3.2.3
kde kde 3.3
kde kde 3.3.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat fedora_core core_2.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
suse suse_linux 8.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "68BD578F-CCAD-4515-9205-EB4F297C6DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "734D0C2C-F71F-461A-87EE-202C6B706753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F0F402D-5CD0-4477-8B59-C753CECB02BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*",
                     matchCriteriaId: "959F7AFA-ED20-434C-993F-06C2A8574662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4F5A0A4-2884-46CA-A846-8B954EB80CFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "35E65857-12C7-49DE-AD27-3CACD456231C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "47CEF035-57A6-470B-916A-E5562C28E866",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E26BB15-4CF8-4496-A7F7-EB34C444EF72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "D414984E-4F6B-4278-8346-968587E4B18E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "33C36DCB-2FDD-44E6-85E8-875575AAE69E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4B7C23-0C54-4FBA-A774-9CC1E148376E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "A786A770-919E-4E23-949D-D836F316618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "00A2249C-73DE-434E-A41F-4EDB0ADC0845",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*",
                     matchCriteriaId: "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB7653F1-70E2-423F-A6A9-30333644B506",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E70576E-C253-4F8B-A93E-14CC2EE7114D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*",
                     matchCriteriaId: "832C5512-B473-40E8-BF4F-EC6ABFE46749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "053435DD-BFDF-4C39-9919-11C42D569085",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9BB1A3C-3348-4545-A513-E504B33F72AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD45E2C8-0B0E-484F-8050-94BF77798183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EAA654E-9DD4-4614-92D7-EF4D676B3A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*",
                     matchCriteriaId: "89C96FC9-40DB-467D-A701-49F97A1B887D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*",
                     matchCriteriaId: "76128BDC-2CA7-4AE7-8C4F-BCB3835CA938",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B2517C7-27EF-4961-91C3-CA33219AFF2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE346726-71D6-438B-B600-A7E107332816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*",
                     matchCriteriaId: "87E85020-B4DB-4011-BDD0-1C8967D45A84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*",
                     matchCriteriaId: "8189A9AB-F685-40E2-944F-8BD3DD6FA0A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*",
                     matchCriteriaId: "C33B8585-FA5F-4210-A997-615BCEE1726F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4AE4C34-C497-426F-AC0D-1805A50582EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2989EFF-07B9-4EF2-B6C1-59E4F52FDC92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3970101-5E83-49FD-BCB6-D9176D46B5A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CC6233-E207-40CC-81FF-A8670EEA4295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*",
                     matchCriteriaId: "0304E1E3-8766-40D0-8879-A652B4E9E72D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*",
                     matchCriteriaId: "188F1343-8082-4B54-8DA4-E344818ABD52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "354487CF-0086-4AE2-872B-0032E3EB89EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1169B802-7279-437F-AF59-621A67DC92EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
                     matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
                     matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82F69843-978D-4686-BC5B-1D09DA4A21BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACEE0AED-7918-41E9-A902-AC4070E03132",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E19472-47B4-4398-A188-CA5A5D3E7060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D17407A2-089E-43A5-9BD5-EFF966F5CC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C4B436D-8D6A-473E-B707-26147208808B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E26B353-4985-4116-B97A-5767CDC732F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.",
      },
   ],
   id: "CVE-2004-0889",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-27T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/11501",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/11501",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110667936707597&w=2
cve@mitre.orghttp://secunia.com/advisories/14015
cve@mitre.orghttp://secunia.com/advisories/14050
cve@mitre.orghttp://securitytracker.com/id?1013007
cve@mitre.orghttp://www.debian.org/security/2005/dsa-658Patch, Vendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200501-38.xmlPatch, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:030
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-072.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/426530/30/6600/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/12360
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/19068
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110667936707597&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/14015
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/14050
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1013007
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-658Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200501-38.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:030
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-072.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/426530/30/6600/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12360
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/19068
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:woody:*:*:*:*:*",
                     matchCriteriaId: "436B1E58-17E8-495B-A2DD-FB1626B9D35B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C62EF915-CA7C-4D75-BC67-E015772BB9CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.",
      },
   ],
   id: "CVE-2005-0077",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-05-02T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/14015",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/14050",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1013007",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2005/dsa-658",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-072.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/12360",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/14015",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/14050",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1013007",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2005/dsa-658",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-072.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/12360",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-10-29 21:46
Modified
2025-04-09 00:30
Severity ?
Summary
GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
cve@mitre.orghttp://secunia.com/advisories/27381Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28627
cve@mitre.orghttp://secunia.com/advisories/30329
cve@mitre.orghttp://secunia.com/advisories/30715
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0485.html
cve@mitre.orghttp://www.securityfocus.com/bid/26188Patch
cve@mitre.orghttp://www.ubuntu.com/usn/usn-537-1Patch
cve@mitre.orghttp://www.ubuntu.com/usn/usn-537-2
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=357071
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=363061
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/37410
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27381Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28627
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30329
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30715
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0485.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26188Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-537-1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-537-2
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=357071
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=363061
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/37410
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "FB928CC9-0BC3-4AE1-B20B-A58A4C4AAE24",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "BB850565-A800-44A6-945E-CB235531C5DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "3F37A796-E028-4247-A5E6-66B89A583F87",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "61DA44B7-FE1A-4452-843E-EAF1404B86F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:compiz:compiz:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93384956-31D4-4111-B447-A6710A8A6306",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnome:screensaver:2.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "F784A89F-6759-4801-B00F-502EE8AD4E71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.",
      },
      {
         lang: "es",
         value: "El salvapantallas 2.20 de GNOME en Ubuntu 7.10, cuando se usa con Compiz, no reserva el foco de entrada apropiadamente, lo cual permite a atacantes remotos con acceso físico tomar el control de la sesión después de haber introducido la secuencia Alt-Tab, tema similar a CVE-2007-3069.",
      },
   ],
   id: "CVE-2007-3920",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:H/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-10-29T21:46:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27381",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/28627",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/30329",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/30715",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/26188",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-537-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/usn-537-2",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27381",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28627",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30329",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30715",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/26188",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-537-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-537-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "This issue affected Red Hat Enterprise Linux 5 with a low security impact.  An update to the compiz package was released to correct this issue: \nhttps://rhn.redhat.com/errata/RHSA-2008-0485.html\n\n",
         lastModified: "2008-05-21T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
References
cve@mitre.orghttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672
cve@mitre.orghttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110306397320336&w=2
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:022
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-293.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/379005
cve@mitre.orghttp://www.securityfocus.com/bid/11491Patch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/11492Patch, Vendor Advisory
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2336
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17816
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728
af854a3a-2127-422b-91ae-364da2661108http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672
af854a3a-2127-422b-91ae-364da2661108http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110306397320336&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-293.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/379005
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11491Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11492Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2336
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17816
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728
Impacted products
Vendor Product Version
linux linux_kernel 2.2.0
linux linux_kernel 2.2.1
linux linux_kernel 2.2.2
linux linux_kernel 2.2.3
linux linux_kernel 2.2.7
linux linux_kernel 2.2.8
linux linux_kernel 2.2.9
linux linux_kernel 2.2.10
linux linux_kernel 2.2.11
linux linux_kernel 2.2.12
linux linux_kernel 2.2.13
linux linux_kernel 2.2.14
linux linux_kernel 2.2.15
linux linux_kernel 2.2.15
linux linux_kernel 2.2.15_pre20
linux linux_kernel 2.2.16
linux linux_kernel 2.2.16
linux linux_kernel 2.2.17
linux linux_kernel 2.2.18
linux linux_kernel 2.2.19
linux linux_kernel 2.2.20
linux linux_kernel 2.2.21
linux linux_kernel 2.2.22
linux linux_kernel 2.2.23
linux linux_kernel 2.2.24
linux linux_kernel 2.2.25
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.1
linux linux_kernel 2.4.2
linux linux_kernel 2.4.3
linux linux_kernel 2.4.4
linux linux_kernel 2.4.5
linux linux_kernel 2.4.6
linux linux_kernel 2.4.7
linux linux_kernel 2.4.8
linux linux_kernel 2.4.9
linux linux_kernel 2.4.10
linux linux_kernel 2.4.11
linux linux_kernel 2.4.12
linux linux_kernel 2.4.13
linux linux_kernel 2.4.14
linux linux_kernel 2.4.15
linux linux_kernel 2.4.16
linux linux_kernel 2.4.17
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.20
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.22
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23_ow2
linux linux_kernel 2.4.24
linux linux_kernel 2.4.24_ow1
linux linux_kernel 2.4.25
linux linux_kernel 2.4.26
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.2
linux linux_kernel 2.6.3
linux linux_kernel 2.6.4
linux linux_kernel 2.6.5
linux linux_kernel 2.6.6
linux linux_kernel 2.6.6
linux linux_kernel 2.6.7
linux linux_kernel 2.6.7
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6_test9_cvs
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "146F7A77-A950-4CAD-BDA9-C239696F569D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD7A6B55-2F3B-422E-B1F2-80B482FE89AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "70DCE8FF-40C3-44F7-8185-0422ADDA051B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DAC3A7C-2092-46D4-908B-CF03F4217112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A6F3945-21ED-44C6-86D2-B7755A87014E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4919EB3-625C-4D83-8DCB-72BCF05DF2C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5DDB008-E88E-473C-B030-AF9B6F5E4E48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E48C9A9-B7E6-4314-BCEF-8013BBB4276E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EEF4480-D50B-464C-AE39-A12455DBC99F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "15928E10-7D41-45B2-87D6-8AA10190A8EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "C18E13C4-F42D-4168-B25E-544E1549C46B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*",
                     matchCriteriaId: "1C4B2ABB-0283-4532-9E29-B37BFF5FDFB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4DADA29-DCD3-44C4-9BDB-B881D6FCE3A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "4BD794C6-11F5-4A2B-9A3C-E03069A1526B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4947CDE-CB89-456B-8B5F-0E17B46BC893",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF701E58-35E8-4DDE-B832-C5A23E61A3CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C122CC4-B8CB-4AB9-8571-6F3D302F56A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "2498D898-D243-4D0C-9AEF-0138D19A68B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "3924060B-1EC1-4003-B306-E327634E7797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "D45B43DF-FD4C-4C37-9569-1CCE450B8987",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "99879B2B-7FFB-4181-8928-13B7E17F36C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "83A3E250-5BC6-4AD3-A3DE-7F876FD90BE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
                     matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
                     matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
                     matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.",
      },
      {
         lang: "es",
         value: "Múltiples condiciones de carrera en la capa de terminal de Linux kernel 2.4.x y 2.6.x anteriores a 2.6.9 permiten a \r\n usuarios locales obtener porciones de datos del kernel mediante una llamada ioctl TIOCSETD a una interfaz de terminal que esté siendo accedida por otro hilo, o a \r\n atacantes remotos causar una denegación de servicio (panic) cambiando de consola a disciplina de línea PPP, y enviando entonces inmediatamente datos que son recibidos durante la conmutación.",
      },
   ],
   id: "CVE-2004-0814",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 1.2,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:H/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-12-23T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672",
      },
      {
         source: "cve@mitre.org",
         url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/379005",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11491",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11492",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/379005",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11491",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11492",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-05-03 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 5.04



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D74EB99-6C5C-46C7-9DE6-9292102DD2DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.",
      },
   ],
   id: "CVE-2005-0106",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-05-03T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18639",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/13471",
      },
      {
         source: "cve@mitre.org",
         url: "https://usn.ubuntu.com/113-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18639",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/13471",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/113-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.",
      },
   ],
   id: "CVE-2004-1151",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://linux.bkbits.net:8080/linux-2.6/cset%401.2079",
      },
      {
         source: "cve@mitre.org",
         url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://linux.bkbits.net:8080/linux-2.6/cset%401.2079",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-01-09 23:03
Modified
2025-04-03 01:03
Severity ?
Summary
sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.
References
cve@mitre.orghttp://secunia.com/advisories/18358Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18363Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18549
cve@mitre.orghttp://secunia.com/advisories/18558
cve@mitre.orghttp://secunia.com/advisories/18906
cve@mitre.orghttp://secunia.com/advisories/19016
cve@mitre.orghttp://secunia.com/advisories/21692
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822
cve@mitre.orghttp://www.debian.org/security/2006/dsa-946
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:159
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_02_sr.html
cve@mitre.orghttp://www.securityfocus.com/bid/16184Exploit
cve@mitre.orghttp://www.trustix.org/errata/2006/0010
cve@mitre.orghttps://usn.ubuntu.com/235-2/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18358Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18363Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18549
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18558
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18906
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19016
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21692
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-946
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_02_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16184Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0010
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/235-2/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6060C8CB-1592-479E-86AD-AC180F855BD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6DAA88C-BADD-405A-9E66-5B0839595A70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "04D5E3B7-5377-4CA8-BA0D-056870CB717E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C11931-B594-43EC-9698-7152B1DF8CA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "976B5923-1BCC-4DE6-A904-930DD833B937",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5452DF1-0270-452D-90EB-45E9A084B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFD12E6-F92E-4371-ADA7-BCD41E4C9014",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "67FDF4FB-06FA-4A10-A3CF-F52169BC8072",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5B29018-B495-482A-8FF7-66821A178F9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*",
                     matchCriteriaId: "38718561-70C7-4E0D-9313-87A5E82ED338",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D057064A-9B34-4224-97BA-4D5840A92BE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3C297DC-69B1-4BE6-A5EF-D320BD0CA968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F4C1FFB-F6AA-4DED-9C54-DCB274F59A44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*",
                     matchCriteriaId: "338A92AC-92D2-40BF-9FAC-884AF6F74D55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*",
                     matchCriteriaId: "26DB5610-03CE-425E-8855-70D5787029FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5DFC86C-7743-4F27-BC10-170F04C23D7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5170421-BA0C-4365-9CD6-BD232EA08680",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5909AAA4-4AF9-4D23-87C5-5D7787909B02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2170CFD0-2594-45FB-B68F-0A75114F00A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*",
                     matchCriteriaId: "03C07744-CAE8-44C6-965E-2A09BAE1F36C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17E0E59-C928-49AB-BAA7-4AE638B376D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "294FC65B-4225-475A-B49A-758823CEDECD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "6156B085-AA17-458C-AED1-D658275E43B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C898BE7-506D-49DA-8619-F86C7A9FE902",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6419309-385F-4525-AD4B-C73B1A3ED935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F7E821-2908-47F1-9665-E9D68ECC242F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C90D0AB4-F8A8-4301-99B5-757254FA999A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A79C7098-37D0-4E6E-A22C-3C771D81956F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB7D2832-B654-406E-AA34-B3BD1D6F0A2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5688D95-89EF-4D2E-9728-2316CAC3CBE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B69E49B2-1B3C-4434-ACF1-CF4F519E3C32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*",
                     matchCriteriaId: "31B2C299-5D0B-44DA-91FD-4B1146BE9A7B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.",
      },
   ],
   id: "CVE-2006-0151",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-01-09T23:03:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18358",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18363",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18549",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18558",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18906",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/19016",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/21692",
      },
      {
         source: "cve@mitre.org",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-946",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/16184",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2006/0010",
      },
      {
         source: "cve@mitre.org",
         url: "https://usn.ubuntu.com/235-2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18358",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18363",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18549",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18558",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18906",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19016",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/21692",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-946",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/16184",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2006/0010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/235-2/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "We do not consider this to be a security issue.\nhttp:bugzilla.redhat.combugzillashow_bug.cgi?id=139478#c1",
         lastModified: "2008-01-24T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-02-07 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
cve@mitre.orghttp://fedoranews.org/updates/FEDORA--.shtml
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110737149402683&w=2
cve@mitre.orghttp://marc.info/?l=full-disclosure&m=110779721503111&w=2
cve@mitre.orghttp://secunia.com/advisories/14120
cve@mitre.orghttp://secunia.com/advisories/55314
cve@mitre.orghttp://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200502-13.xmlExploit, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:031
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-103.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-105.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/12426Patch, Vendor Advisory
cve@mitre.orghttp://www.trustix.org/errata/2005/0003/Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/19208
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA--.shtml
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110737149402683&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=full-disclosure&m=110779721503111&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/14120
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55314
af854a3a-2127-422b-91ae-364da2661108http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200502-13.xmlExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:031
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-103.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-105.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12426Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2005/0003/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/19208
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D30E072-9E6A-49B4-A5C7-63A328598A68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "434F0580-985F-42AF-BA10-FAB7E2C23ED0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "18B179E0-C843-46C9-AAD2-78E998175E41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5E5A51-ED4C-4927-8C4D-502E79391E19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "171C82CB-2E92-4D41-B1B1-DCFE929E8270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "25633253-D9DE-41F0-A787-D0E8B2B3B9F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEDF9611-E4E2-4059-B45E-D3A61AC9DB47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "49A9D197-D889-4BE4-BE7A-2EE9536A7498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0A4538C-3870-431E-A225-D8523D77A4E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8233B3A-E09D-425B-B1A1-65CD170FD384",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "29DC217F-C257-4A3C-9CBD-08010C30BEC3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "17EECCCB-D7D1-439A-9985-8FAE8B44487B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA8DDF4A-1C5D-4CB1-95B3-69EAE6572507",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.",
      },
   ],
   id: "CVE-2005-0156",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-02-07T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056",
      },
      {
         source: "cve@mitre.org",
         url: "http://fedoranews.org/updates/FEDORA--.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/14120",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/55314",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-103.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-105.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/12426",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.trustix.org/errata/2005/0003/",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://fedoranews.org/updates/FEDORA--.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/14120",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/55314",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-103.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-105.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/12426",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.trustix.org/errata/2005/0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-09-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
References
cve@mitre.orghttp://secunia.com/advisories/28800
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1
cve@mitre.orghttp://www.debian.org/security/2004/dsa-547Patch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-480.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-494.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0412
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17173
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28800
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-547Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-480.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-494.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0412
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17173
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123
Impacted products
Vendor Product Version
enlightenment imlib 1.9
enlightenment imlib 1.9.1
enlightenment imlib 1.9.2
enlightenment imlib 1.9.3
enlightenment imlib 1.9.4
enlightenment imlib 1.9.5
enlightenment imlib 1.9.6
enlightenment imlib 1.9.7
enlightenment imlib 1.9.8
enlightenment imlib 1.9.9
enlightenment imlib 1.9.10
enlightenment imlib 1.9.11
enlightenment imlib 1.9.12
enlightenment imlib 1.9.13
enlightenment imlib 1.9.14
enlightenment imlib2 1.0
enlightenment imlib2 1.0.1
enlightenment imlib2 1.0.2
enlightenment imlib2 1.0.3
enlightenment imlib2 1.0.4
enlightenment imlib2 1.0.5
enlightenment imlib2 1.1
enlightenment imlib2 1.1.1
imagemagick imagemagick 5.3.3
imagemagick imagemagick 5.4.3
imagemagick imagemagick 5.4.4.5
imagemagick imagemagick 5.4.7
imagemagick imagemagick 5.4.8
imagemagick imagemagick 5.4.8.2.1.1.0
imagemagick imagemagick 5.5.3.2.1.2.0
imagemagick imagemagick 5.5.6.0_2003-04-09
imagemagick imagemagick 5.5.7
imagemagick imagemagick 6.0.2
sun java_desktop_system 2.0
sun java_desktop_system 2003
conectiva linux 9.0
conectiva linux 10.0
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat fedora_core core_1.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
suse suse_linux 8.0
suse suse_linux 8.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
turbolinux turbolinux desktop_10.0
turbolinux turbolinux server_7.0
turbolinux turbolinux server_8.0
turbolinux turbolinux workstation_7.0
turbolinux turbolinux workstation_8.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC774637-8B95-4C69-8665-86A67EAEBB24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9928B65C-A2F3-4D95-9A73-6DE4415463B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "072BDD6E-D815-4996-B78C-42502FB8BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE9D28DB-FFC6-4C7F-89F6-85740B239271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "988CDE52-220B-489D-9644-94CC5274E678",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B49B4277-ECFD-4568-94C1-6E02BF238A2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "882A873F-D3D3-4E11-9C6B-B45C53672711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA760F0-EFA2-4B4E-BB95-8FD857CD3250",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C72DEC7-5558-4121-89CE-6E9B382C849E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6880B01C-0804-4CCF-9916-89807BBD4C8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FE16231-4FB4-4D30-BE83-AD400E357280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "27937897-40B1-4D86-AFF0-ACA1B7F7A33E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "A533869A-BAF1-4A26-AD33-0C4B6A62AA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "917A16B8-65F3-4C5D-904E-DD0FBD46A3F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib:1.9.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "89F6F148-15BA-4F07-A7A6-457B54FB234E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E1CF072-E421-4BAA-9B29-421B101171B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "630D2700-3AF2-4F6C-B045-41571B602B86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1750F261-8A88-4C9C-A86B-ED1D6F41C408",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7606397B-A6F0-41AA-8DA2-B3ECBC7374EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F69E5CC4-422F-4E4C-8E4C-8EA3479D759E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B6EC79E-A937-4781-AF55-35BCB2247C52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3DCF542-ABD1-448A-BD6F-F3FB4DB957C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:enlightenment:imlib2:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6A7F9B2-116C-4AB8-98B0-729D0AB8545E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D83FADC-4C7F-4C16-BBAA-9883D7449744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B45B5EE8-00FB-46FE-9A26-7468AD30B540",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "6534A963-C0A7-47D6-8E1B-B8D0F3933428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FD06A99-7CBF-4593-9EA1-5D1A800D8C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BDC9494-E79B-4497-8413-A44DF326ABB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "563F49AC-D60F-4E00-9E0D-7EDAA2FFFCD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BDB0628-9BFD-4262-886C-E971EC262134",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CEEBE6-7CE6-4E1B-8828-EDD64EA3A338",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "193A610A-5E5E-4A87-A501-902100D1C2AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F682CD-0117-4770-877F-1F3903BAFE04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sun:java_desktop_system:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5537D6C-7700-4818-93F7-4449049DF131",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sun:java_desktop_system:2003:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1587AB3-180E-4734-A0AC-4EE5A93B469A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:desktop_10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "49A34783-39EF-471A-9B8B-72CBF2BB3E30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:server_7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "42FB8BA2-8651-4806-9172-0E03F6B7AAD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:server_8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "79B0F1A4-BE4C-4A33-B1F5-9C158B228D82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:workstation_7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE73E6EB-6712-4DD8-847B-67CCA9A8E0A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:workstation_8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1066BFAC-0156-4440-A32B-BC1B5228DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.",
      },
   ],
   id: "CVE-2004-0827",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-09-16T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/28800",
      },
      {
         source: "cve@mitre.org",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2004/dsa-547",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-480.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-494.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2008/0412",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28800",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2004/dsa-547",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-480.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-494.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/0412",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-03-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
References
secalert@redhat.comhttp://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.htmlVendor Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=111204562102633&w=2
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-283.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-284.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-293.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-366.html
secalert@redhat.comhttp://www.securityfocus.com/bid/12911
secalert@redhat.comhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/19844
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=111204562102633&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-283.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-284.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-293.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-366.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12911
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/19844
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "361D407D-A4BE-491D-BC8E-32E78DC4A8F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CDE1E92-C64D-4A3B-95A2-384BD772B28B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D90502F-EC45-4ADC-9428-B94346DA660B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "138985E6-5107-4E8B-A801-C3D5FE075227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:i686:*:*:*:*:*",
                     matchCriteriaId: "05853955-CA81-40D3-9A70-1227F3270D3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
                     matchCriteriaId: "C7EAAD04-D7C4-43DE-B488-1AAD014B503E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D073E9-E535-4B36-BEF2-8499536E37DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.",
      },
   ],
   id: "CVE-2005-0750",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-03-27T05:00:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://marc.info/?l=bugtraq&m=111204562102633&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/12911",
      },
      {
         source: "secalert@redhat.com",
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19844",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=111204562102633&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-283.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-284.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-293.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-366.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/12911",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19844",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:bogofilter:email_filter:0.9.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4219CFEB-559A-473D-BE6B-86A9FCA2C653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bogofilter:email_filter:0.9.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "925D3591-4D0E-48A7-85B3-186A44775648",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bogofilter:email_filter:0.9.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EA9F713-AFF9-4246-BEF6-3F878D4859F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bogofilter:email_filter:0.92:*:*:*:*:*:*:*",
                     matchCriteriaId: "4920DD7B-1345-4BB7-8E34-9A19FDEE4A17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bogofilter:email_filter:0.92.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C69E15B-BD2E-4CD4-B0C1-27080C378CDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bogofilter:email_filter:0.92.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "29F61AE7-DD1E-40C7-A068-3544EE529BFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:bogofilter:email_filter:0.92.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D91F10AC-9857-439B-869A-11B7A6ECE515",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.",
      },
   ],
   id: "CVE-2004-1007",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-03-01T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2008-11-17 18:18
Modified
2025-04-09 00:30
Severity ?
Summary
The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:dcgrendel:vmbuilder:0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "131A9ABC-41B8-42D4-871C-5375D413F1FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:_nil_:lts:*:*:*:*:*",
                     matchCriteriaId: "8CC514F1-FFCF-4ADD-8A2C-F22C693F9DCF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.04:_nil_:lts:*:*:*:*:*",
                     matchCriteriaId: "3DD8F0EE-8DD3-4399-83E4-AD4FC89A1DCD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED67B852-4B37-4B79-8F4D-23B2FEACA4ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.",
      },
      {
         lang: "es",
         value: "Las implementaciones (1) python-vm-builder y (2) ubuntu-vm-builder en VMBuilder v0.9 en Ubuntu v8.10 omiten la opción -e cuando invocan chpasswd con un argumento root:!, lo cual configura la cuenta raíz con una contraseña en texto claro de ! (punto de exclamación) y permite a atacantes evitar restricciones de login intencionadas.",
      },
   ],
   id: "CVE-2008-5103",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2008-11-17T18:18:48.017",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
      },
      {
         source: "cve@mitre.org",
         url: "http://osvdb.org/49996",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/32697",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/32292",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-670-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/49996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/32697",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/32292",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-670-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-255",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110072140811965&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110082989725345&w=2
cve@mitre.orghttp://secunia.com/advisories/13232/
cve@mitre.orghttp://secunia.com/advisories/20162
cve@mitre.orghttp://secunia.com/advisories/20163
cve@mitre.orghttp://secunia.com/advisories/20202
cve@mitre.orghttp://secunia.com/advisories/20338
cve@mitre.orghttp://security.e-matters.de/advisories/142004.html
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1067
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1069
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1070
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1082
cve@mitre.orghttp://www.kb.cert.org/vuls/id/726198US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:022
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-504.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-505.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-537.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/11695Patch, Vendor Advisory
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2336
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18134
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18135
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18136
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110072140811965&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110082989725345&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13232/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20162
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20163
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20202
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20338
af854a3a-2127-422b-91ae-364da2661108http://security.e-matters.de/advisories/142004.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1067
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1069
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1070
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1082
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/726198US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-504.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-505.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-537.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11695Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2336
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18134
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18135
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18136
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330
Impacted products
Vendor Product Version
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.1
linux linux_kernel 2.4.2
linux linux_kernel 2.4.3
linux linux_kernel 2.4.4
linux linux_kernel 2.4.5
linux linux_kernel 2.4.6
linux linux_kernel 2.4.7
linux linux_kernel 2.4.8
linux linux_kernel 2.4.9
linux linux_kernel 2.4.10
linux linux_kernel 2.4.11
linux linux_kernel 2.4.12
linux linux_kernel 2.4.13
linux linux_kernel 2.4.14
linux linux_kernel 2.4.15
linux linux_kernel 2.4.16
linux linux_kernel 2.4.17
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.20
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.22
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23_ow2
linux linux_kernel 2.4.24
linux linux_kernel 2.4.24_ow1
linux linux_kernel 2.4.25
linux linux_kernel 2.4.26
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.2
linux linux_kernel 2.6.3
linux linux_kernel 2.6.4
linux linux_kernel 2.6.5
linux linux_kernel 2.6.6
linux linux_kernel 2.6.6
linux linux_kernel 2.6.7
linux linux_kernel 2.6.7
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.9
linux linux_kernel 2.6_test9_cvs
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
suse suse_linux 1.0
suse suse_linux 8
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
trustix secure_linux 1.5
trustix secure_linux 2.0
trustix secure_linux 2.1
trustix secure_linux 2.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
                     matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
                     matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
                     matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
                     matchCriteriaId: "C7EAAD04-D7C4-43DE-B488-1AAD014B503E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "D2E2EF3C-1379-4CBE-8FF5-DACD47834651",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.",
      },
      {
         lang: "es",
         value: "Múltiples vulnerabilidades en el sistema de ficheros de samba (smbfs) en los kernel de Linux 2.4 y 2.6 permite a servidores samba remotos causar una denegación de servicio (caída) u obtener información sensible de la memoria del kernel mediante un servidor samba \r\n\r\nque devuelva más datos de los solicitados a la función smb_proc_read\r\nque devuelva un desplazamiento de datos de fuera del paquete samba a la función smb_proc_readX, \r\nque envíe una cierto paquete fragmentado TRANS2 a la función smb_receive_trans2, \r\nque envíe un paquete samba con un cierto tamaño de cabecera a la función smb_proc_readX, o \r\n que envíe un cierto desplazamiento basado en el paquete para los datos en un paquete a la función smb_receive_trans2",
      },
   ],
   id: "CVE-2004-0883",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/13232/",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/142004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/726198",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11695",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/13232/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/142004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/726198",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11695",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110306397320336&w=2
cve@mitre.orghttp://secunia.com/advisories/19607
cve@mitre.orghttp://secunia.com/advisories/20162
cve@mitre.orghttp://secunia.com/advisories/20163
cve@mitre.orghttp://secunia.com/advisories/20202
cve@mitre.orghttp://secunia.com/advisories/20338
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1067
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1069
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1070
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1082
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:022
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_44_kernel.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-504.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-505.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-537.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/381689
cve@mitre.orghttp://www.securityfocus.com/bid/11715Patch, Vendor Advisory
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2336
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18230
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110306397320336&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19607
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20162
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20163
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20202
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20338
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1067
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1069
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1070
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1082
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_44_kernel.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-504.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-505.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-537.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/381689
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11715Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2336
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18230
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384
Impacted products
Vendor Product Version
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.1
linux linux_kernel 2.4.2
linux linux_kernel 2.4.3
linux linux_kernel 2.4.4
linux linux_kernel 2.4.5
linux linux_kernel 2.4.6
linux linux_kernel 2.4.7
linux linux_kernel 2.4.8
linux linux_kernel 2.4.9
linux linux_kernel 2.4.10
linux linux_kernel 2.4.12
linux linux_kernel 2.4.13
linux linux_kernel 2.4.14
linux linux_kernel 2.4.15
linux linux_kernel 2.4.16
linux linux_kernel 2.4.17
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.20
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.22
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23_ow2
linux linux_kernel 2.4.24
linux linux_kernel 2.4.24_ow1
linux linux_kernel 2.4.25
linux linux_kernel 2.4.26
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
                     matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
                     matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
                     matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.",
      },
      {
         lang: "es",
         value: "Un error de \"falta de serialización\" en la función unix_dgram_recvmsg en Linux 2.4.27 y anteriores, y 2.6.x hasta 2.6.9, permite a usurios locales ganar privilegios aprovechando una condición de carrera.",
      },
   ],
   id: "CVE-2004-1068",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:H/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/19607",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/381689",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11715",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19607",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-504.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-505.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-537.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/381689",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11715",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-11-06 17:07
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.
References
secalert@redhat.comhttp://secunia.com/advisories/22740Exploit, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22745Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22768
secalert@redhat.comhttp://secunia.com/advisories/22854
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200611-08.xml
secalert@redhat.comhttp://securitytracker.com/id?1017160
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:200
secalert@redhat.comhttp://www.securityfocus.com/bid/20906
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-378-1Patch
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4350
secalert@redhat.comhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833Exploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22740Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22745Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22768
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22854
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200611-08.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017160
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:200
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/20906
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-378-1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4350
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833Exploit
Impacted products
Vendor Product Version
rpm package_manager 4.4.8
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:rpm:package_manager:4.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1CADBE5-0FAA-437F-AB62-B457935938D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer basado en montón en la función shoqQueryPackage en librpm en RPM Package Manager 4.4.8, cuando la variable de entorno LANG tiene el valor ru_RU.UTF-8, podría permitir a atacantes con la intervención del usuario ejecutar código de su elección mediante paquetes RPM manipulados.",
      },
   ],
   evaluatorSolution: "Successful exploitation may allow the execution of arbitrary code, but requires that certain locales are set (e.g. ru_RU.UTF-8).\r\nThere are patches available for each affected Ubuntu product.",
   id: "CVE-2006-5466",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 5.4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 4.9,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2006-11-06T17:07:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22740",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22745",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22768",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22854",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200611-08.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://securitytracker.com/id?1017160",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:200",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/20906",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-378-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4350",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
         ],
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22740",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22745",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22768",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22854",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200611-08.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1017160",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:200",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/20906",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-378-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4350",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vendorComments: [
      {
         comment: "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213515\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
References
secalert@redhat.comftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
secalert@redhat.comhttp://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlPatch
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2006-0177.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://scary.beasts.org/security/CESA-2005-003.txtExploit
secalert@redhat.comhttp://secunia.com/advisories/18147
secalert@redhat.comhttp://secunia.com/advisories/18303Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18312Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18313Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18329Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18332Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18334Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18335Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18338Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18349Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18373
secalert@redhat.comhttp://secunia.com/advisories/18375Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18380
secalert@redhat.comhttp://secunia.com/advisories/18385Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18387Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18389Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18398Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18407Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18414
secalert@redhat.comhttp://secunia.com/advisories/18416Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18423Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18425
secalert@redhat.comhttp://secunia.com/advisories/18428
secalert@redhat.comhttp://secunia.com/advisories/18436
secalert@redhat.comhttp://secunia.com/advisories/18448Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18463
secalert@redhat.comhttp://secunia.com/advisories/18517Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18534Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18554Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18582Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18642Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18644Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18674Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18675Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18679Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18908Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/18913
secalert@redhat.comhttp://secunia.com/advisories/19230
secalert@redhat.comhttp://secunia.com/advisories/19377
secalert@redhat.comhttp://secunia.com/advisories/25729
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-931
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-932
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-937
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-938
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-940
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-936Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-950Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-961Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-962
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
secalert@redhat.comhttp://www.kde.org/info/security/advisory-20051207-2.txtPatch, Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:003
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:004
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:005
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:006
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:008
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:010
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:011
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:012
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.htmlPatch
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.htmlPatch
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0160.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0163.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/427053/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/427990/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/16143Patch
secalert@redhat.comhttp://www.trustix.org/errata/2006/0002/
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/0047
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2280
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/24023
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
secalert@redhat.comhttps://usn.ubuntu.com/236-1/
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2006-0177.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://scary.beasts.org/security/CESA-2005-003.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18147
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18303Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18312Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18313Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18329Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18332Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18334Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18335Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18338Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18349Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18373
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18375Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18380
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18385Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18387Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18389Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18398Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18407Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18414
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18416Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18423Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18425
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18428
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18436
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18448Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18463
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18517Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18534Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18554Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18582Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18642Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18644Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18674Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18675Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18679Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18908Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18913
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19230
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19377
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25729
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-931
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-932
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-937
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-938
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-940
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-936Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-950Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-961Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-962
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-02.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kde.org/info/security/advisory-20051207-2.txtPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0160.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0163.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427053/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427990/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16143Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0002/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0047
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2280
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/236-1/
Impacted products
Vendor Product Version
easy_software_products cups 1.1.22
easy_software_products cups 1.1.22_rc1
easy_software_products cups 1.1.23
easy_software_products cups 1.1.23_rc1
kde kdegraphics 3.2
kde kdegraphics 3.4.3
kde koffice 1.4
kde koffice 1.4.1
kde koffice 1.4.2
kde kpdf 3.2
kde kpdf 3.4.3
kde kword 1.4.2
libextractor libextractor *
poppler poppler 0.4.2
sgi propack 3.0
tetex tetex 1.0.7
tetex tetex 2.0
tetex tetex 2.0.1
tetex tetex 2.0.2
tetex tetex 3.0
xpdf xpdf 3.0
conectiva linux 10.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
debian debian_linux 3.1
gentoo linux *
mandrakesoft mandrake_linux 10.1
mandrakesoft mandrake_linux 10.1
mandrakesoft mandrake_linux 10.2
mandrakesoft mandrake_linux 10.2
mandrakesoft mandrake_linux 2006
mandrakesoft mandrake_linux 2006
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 3.0
mandrakesoft mandrake_linux_corporate_server 3.0
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux_desktop 3.0
redhat enterprise_linux_desktop 4.0
redhat fedora_core core_1.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat fedora_core core_4.0
redhat linux 7.3
redhat linux 9.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
sco openserver 5.0.7
sco openserver 6.0
slackware slackware_linux 9.0
slackware slackware_linux 9.1
slackware slackware_linux 10.0
slackware slackware_linux 10.1
slackware slackware_linux 10.2
suse suse_linux 1.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.1
suse suse_linux 9.1
suse suse_linux 9.2
suse suse_linux 9.2
suse suse_linux 9.2
suse suse_linux 9.3
suse suse_linux 9.3
suse suse_linux 9.3
suse suse_linux 10.0
suse suse_linux 10.0
trustix secure_linux 2.0
trustix secure_linux 2.2
trustix secure_linux 3.0
turbolinux turbolinux 10
turbolinux turbolinux fuji
turbolinux turbolinux_appliance_server 1.0_hosting_edition
turbolinux turbolinux_appliance_server 1.0_workgroup_edition
turbolinux turbolinux_desktop 10.0
turbolinux turbolinux_home *
turbolinux turbolinux_multimedia *
turbolinux turbolinux_personal *
turbolinux turbolinux_server 8.0
turbolinux turbolinux_server 10.0
turbolinux turbolinux_server 10.0_x86
turbolinux turbolinux_workstation 8.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10
ubuntu ubuntu_linux 5.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "787B918D-9CCC-44FE-92AF-E8DF1E91A3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "C116493B-2837-4531-9291-A9FF03099A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*",
                     matchCriteriaId: "525BD04B-387F-4713-BC89-472D0D0BCFD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BF92649-90CE-4E75-A938-61D0916B5A7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CA505B4-0C17-49C8-9533-CA8CE3AA77D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "37C08E0A-651F-458B-BCEC-A30DCD527E47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6000D6AF-C056-4BC0-A54C-72E23E52AB92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D036E4-FA49-417D-968B-9D73B16A09BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC2AB9CB-DEAB-45AB-A7CA-D19E069907EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAC32BAA-99B3-4B40-83A3-ED9E1B12B295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "679D9520-DE8E-4D06-A227-3B1C1D05977D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*",
                     matchCriteriaId: "EF8ABD90-AD2B-4FA0-A355-9D7CD6D3C486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9178B36F-41D5-4AE7-B9C8-56BDEADE76EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
                     matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
                     matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "AF8AE8C4-810F-41AB-A251-5A2D4DD6884D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*",
                     matchCriteriaId: "5EACF214-FA27-44FF-A431-927AB79377A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "E2B58895-0E2A-4466-9CB2-0083349A83B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "03F8220A-9B1C-40AA-AEAB-F9A93225FBD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "2311919C-7864-469D-B0F6-9B11D8D0A1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "19876495-4C1A-487C-955A-C5AA46362A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*",
                     matchCriteriaId: "D75286DD-50BC-4B72-8AC8-E20730124DC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "1998C972-497E-4916-B50E-FB32303EEA8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "A6CD3DD9-3A8A-4716-A2D1-136A790AFF94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "6CE2020A-4FB2-4FCD-8561-7BD147CD95EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "08E90AFA-C262-46D0-B60E-26B67C9602D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "0315FB43-D199-4734-B724-50ED031C0020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D69B83-4EF3-407B-8E8C-DE623F099C17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "7D221688-18A0-453D-8D13-6B68011FCA13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*",
                     matchCriteriaId: "597094EC-D23F-4EC4-A140-96F287679124",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*",
                     matchCriteriaId: "C4FCF0D3-A6CB-448E-B0D3-DA82BE02DEC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C720DACC-CF4B-4A00-818C-8303A7D7DED6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
                     matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7458BA31-812E-40C9-BB92-8688A3BCBA56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29C5A03-A7C9-4780-BB63-CF1E874D018D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "70440F49-AEE9-41BE-8E1A-43AB657C8E09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02EE2D72-B1E6-4380-80B0-E40A23DDD115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*",
                     matchCriteriaId: "F239BA8A-6B41-4B08-8C7C-25D235812C50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*",
                     matchCriteriaId: "89BA858B-9466-4640-84AE-DC5BDC65D6B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*",
                     matchCriteriaId: "85F2D904-E830-4034-9CCB-0FF65019622C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*",
                     matchCriteriaId: "3EA56868-ACA1-4C65-9FFB-A68129D2428A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*",
                     matchCriteriaId: "1BA2E629-58C6-4BA0-A447-F8F570B35E74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "D5F98B9A-880E-45F0-8C16-12B22970F0D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*",
                     matchCriteriaId: "3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*",
                     matchCriteriaId: "C89BA3B6-370B-4911-A363-935A9C9EACF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*",
                     matchCriteriaId: "4F1B4D15-0562-44D6-B80B-35A8F432BD41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*",
                     matchCriteriaId: "D84ABF78-0D85-4E15-907E-B5ACE86EB8C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "9C7018E7-F90C-435D-A07A-05A294EA2827",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*",
                     matchCriteriaId: "16915004-1006-41D6-9E42-D1A5041E442D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*",
                     matchCriteriaId: "994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "100A2456-BF20-4461-8DC9-C61889322B29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C7D4F57-E186-497A-B390-92E5D2C7E894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC3F6F3-9A6E-4A98-A967-6776C872475C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3218DD-A565-4AB8-86FE-E7F59AC0535F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*",
                     matchCriteriaId: "97AEDB57-202F-4B53-8815-21836F177060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E27180A1-9767-4CD3-978C-7538155B162D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAAA9376-A060-49AE-86A7-6B28E26ED5D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B484D091-62DE-4EF2-AC54-26896CA8B315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5AC26E-3F3F-4D14-BE65-82B4432AB382",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka \"Infinite CPU spins.\"",
      },
   ],
   id: "CVE-2005-3625",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-12-31T05:00:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
         ],
         url: "http://scary.beasts.org/security/CESA-2005-003.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18147",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18303",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18312",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18313",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18329",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18332",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18334",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18335",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18338",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18349",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18373",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18375",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18380",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18385",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18387",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18389",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18398",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18407",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18414",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18416",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18423",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18425",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18428",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18436",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18448",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18463",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18517",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18534",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18554",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18582",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18642",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18644",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18674",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18675",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18679",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18908",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/18913",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/19230",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/19377",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25729",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-931",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-932",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-937",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-938",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2005/dsa-940",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-936",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-950",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-961",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2006/dsa-962",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/16143",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.trustix.org/errata/2006/0002/",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/0047",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/2280",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575",
      },
      {
         source: "secalert@redhat.com",
         url: "https://usn.ubuntu.com/236-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://scary.beasts.org/security/CESA-2005-003.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18147",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18303",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18312",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18313",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18329",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18332",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18334",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18335",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18349",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18373",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18375",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18380",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18385",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18387",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18389",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18398",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18407",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18414",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18416",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18423",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18425",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18428",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18436",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18448",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18463",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18517",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18534",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18554",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18582",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18642",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18644",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18674",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18675",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18679",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18908",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18913",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19230",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19377",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25729",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-931",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-932",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-937",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-938",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-940",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-936",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-950",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-961",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-962",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.kde.org/info/security/advisory-20051207-2.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/16143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2006/0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/0047",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/2280",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/236-1/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-03-13 12:18
Modified
2025-04-03 01:03
Severity ?
Summary
The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 5.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE3B4BE-7B43-47C7-823A-C019DF12498F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.",
      },
   ],
   id: "CVE-2006-1183",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-03-13T12:18:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/19200",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1015761",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/23868",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/17086",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2006/0927",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606",
      },
      {
         source: "cve@mitre.org",
         url: "https://usn.ubuntu.com/262-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19200",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1015761",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/23868",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/17086",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/0927",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/262-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-12-14 00:28
Modified
2025-04-09 00:30
Summary
Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 6.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.",
      },
      {
         lang: "es",
         value: "Ubuntu Linux 6.10 para PowerPC (PPC) permite a usuarios locales provocar una denegación de servicio (consumo de recursos) utilizando las funciones (1) sys_get_robust_list y (2) sys_set_robust_list para crear procesos que no pueden ser eliminados.",
      },
   ],
   id: "CVE-2006-5648",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 4.6,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:S/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.1,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2006-12-14T00:28:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23361",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23384",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23474",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/21582",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-395-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23361",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23384",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23474",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/21582",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-395-1",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-09-18 19:17
Modified
2025-04-09 00:30
Severity ?
Summary
Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
References
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
secalert@redhat.comhttp://bugs.gentoo.org/show_bug.cgi?id=192472
secalert@redhat.comhttp://dist.trolltech.com/developer/download/175791_3.diff
secalert@redhat.comhttp://dist.trolltech.com/developer/download/175791_4.diff
secalert@redhat.comhttp://fedoranews.org/updates/FEDORA-2007-221.shtml
secalert@redhat.comhttp://fedoranews.org/updates/FEDORA-2007-703.shtml
secalert@redhat.comhttp://osvdb.org/39384
secalert@redhat.comhttp://secunia.com/advisories/26778Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/26782Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/26804
secalert@redhat.comhttp://secunia.com/advisories/26811Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/26857
secalert@redhat.comhttp://secunia.com/advisories/26868
secalert@redhat.comhttp://secunia.com/advisories/26882
secalert@redhat.comhttp://secunia.com/advisories/26987
secalert@redhat.comhttp://secunia.com/advisories/27053
secalert@redhat.comhttp://secunia.com/advisories/27275
secalert@redhat.comhttp://secunia.com/advisories/27382
secalert@redhat.comhttp://secunia.com/advisories/27996
secalert@redhat.comhttp://secunia.com/advisories/28021
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200710-28.xml
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200712-08.xml
secalert@redhat.comhttp://securitytracker.com/id?1018688
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2007-424.htm
secalert@redhat.comhttp://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1426
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:183
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2007_19_sr.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0883.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/481498/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/25657
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-513-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/3144
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=269001
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1751
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=192472
af854a3a-2127-422b-91ae-364da2661108http://dist.trolltech.com/developer/download/175791_3.diff
af854a3a-2127-422b-91ae-364da2661108http://dist.trolltech.com/developer/download/175791_4.diff
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2007-221.shtml
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2007-703.shtml
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/39384
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26778Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26782Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26804
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26811Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26857
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26868
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26882
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26987
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27053
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27275
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27382
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27996
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28021
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200710-28.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200712-08.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1018688
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm
af854a3a-2127-422b-91ae-364da2661108http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1426
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:183
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_19_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0883.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/481498/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25657
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-513-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3144
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=269001
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1751
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159
Impacted products
Vendor Product Version
conectiva linux 9.0
conectiva linux 10.0
gentoo linux *
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 2007
mandrakesoft mandrake_linux 2007
mandrakesoft mandrake_linux 2007.1
mandrakesoft mandrake_linux 2007.1
mandrakesoft mandrake_linux_corporate_server 3.0
mandrakesoft mandrake_linux_corporate_server 3.0
mandrakesoft mandrake_linux_corporate_server 4.0
mandrakesoft mandrake_linux_corporate_server 4.0
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 5.0
redhat enterprise_linux 5.0
redhat enterprise_linux 5.0
redhat linux 2.1
redhat linux 3.0
redhat linux 4.0
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.04
trolltech qt 3.0
trolltech qt 3.0.3
trolltech qt 3.0.5
trolltech qt 3.1
trolltech qt 3.1.1
trolltech qt 3.1.2
trolltech qt 3.2.1
trolltech qt 3.2.3
trolltech qt 3.3.0
trolltech qt 3.3.1
trolltech qt 3.3.2
trolltech qt 3.3.3
trolltech qt 3.3.4
trolltech qt 3.3.5
trolltech qt 3.3.6
trolltech qt 3.3.7
trolltech qt 3.3.8
trolltech qt 4.1
trolltech qt 4.1.4
trolltech qt 4.1.5
trolltech qt 4.2
trolltech qt 4.2.1
trolltech qt 4.2.3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*",
                     matchCriteriaId: "02362C25-B373-4FB1-AF4A-2AFC7F7D4387",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "19AD5F8D-6EB9-4E4B-9E82-FFBAB68797E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "19D64247-F0A0-4984-84EA-B63FC901F002",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "316AA6EB-7191-479E-99D5-40DA79E340E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F65351-C2DA-41C0-A3F9-1AE951E4386E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "1B795F9F-AFB3-4A2A-ABC6-9246906800DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
                     matchCriteriaId: "492EA1BE-E678-4300-A690-3BFCD4B233B2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*",
                     matchCriteriaId: "C4B5DD1C-BFF6-4247-B684-A7C3D8F60745",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
                     matchCriteriaId: "4E3C9031-F69A-4B6A-A8CB-39027174AA01",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:as:*:*:*:*:*",
                     matchCriteriaId: "327FEE54-79EC-4B5E-B838-F3C61FCDF48E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:es:*:*:*:*:*",
                     matchCriteriaId: "056C1C15-D110-4309-A9A6-41BD753FE4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:ws:*:*:*:*:*",
                     matchCriteriaId: "08392974-5AC1-4B12-893F-3F733EF05F80",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*",
                     matchCriteriaId: "49EF5B77-9BC9-4AE8-A677-48E5E576BE63",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*",
                     matchCriteriaId: "36389D32-61C1-4487-8399-FA7D2864FACD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*",
                     matchCriteriaId: "49B67F74-AF8F-4A27-AA8A-A8479E256A9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:client:*:*:*:*:*",
                     matchCriteriaId: "3AA8F2EC-55E9-4529-A816-B5D495605F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:client_workstation:*:*:*:*:*",
                     matchCriteriaId: "28FBE982-794E-4C22-B5EE-F48269282C32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*",
                     matchCriteriaId: "40D71CBC-D365-4710-BAB5-8A1159F35E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:2.1:*:aw_itanium:*:*:*:*:*",
                     matchCriteriaId: "6B34B4FF-A596-4B1E-8DA7-40B3498147EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBBA00E3-1147-4E6F-BE93-92494285F88F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9092D88-585D-4A0C-B181-E8D93563C74B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "F1672825-AB87-4402-A628-B33AE5B7D4C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*",
                     matchCriteriaId: "939216D8-9E6C-419E-BC0A-EC7F0F29CE95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "E520564E-964D-4758-945B-5EF0C35E605C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "2294D5A7-7B36-497A-B0F1-514BC49E1423",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "AB80939E-8B58-48B6-AFB7-9CF518C0EE1F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "61B11116-FA94-4989-89A1-C7B551D5195A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "7BD79C43-2615-47DE-A100-D21482D866F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "1856594D-7D84-4830-A8A7-2C9D4C2D61FD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "0B20DDF0-2FAB-4EB0-B62D-2351514B2808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "B7748895-CE00-4BB8-BFCD-A5559BA15869",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CB2B261-F31A-4EDF-89D5-1648E7698559",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E995A0F0-E1BB-441D-B145-1FB0AF4330DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0B868D0-B166-455D-A96F-8530853D83EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F354E5EE-0B83-4960-98DF-9DBBB504C1C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B546D37F-7115-4CA4-8A63-BFCC0B9E1E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA756A7-DE14-40F4-87F6-B3374E88B21A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD3DFD7-307F-4110-A412-D1C56836DF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6D18E6C-5202-4406-AEC8-6477CDA7AE67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A881DD8-9B96-4581-B39B-7721CBCD5F4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C314FF87-F182-4ABF-93D4-748EEF47C5FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "63829009-5782-4671-8678-2F090CA5520A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AA116DA-DA3F-415C-88A7-3E65EAA2089C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9734F0E-6CB9-4C8C-B2D0-21ABA6A22D58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B28B5A5-98EF-4710-B8B5-D348692046BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1539C15-BF9A-43B5-8D29-A3F2C87F92A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9E9281D-0DB4-491C-AD2B-E7CA77FC7E48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:3.3.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DB7CA86-30F5-48B0-AB47-C4871E16DA10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "00ED4154-E5B7-49F5-B97F-2B02C82D6B0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:4.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FC87D43-8E5E-4AD7-8228-345C042EC98F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:4.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1461D39A-7705-4932-ABA9-4A2869E692F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E47B11C-9098-4F39-8BF3-46C95CE63B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:4.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "00F001C9-E388-437A-8F72-1C1C4D54FB7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:trolltech:qt:4.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C558DAB-23BD-4076-B839-36B269B97650",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.",
      },
      {
         lang: "es",
         value: "Error de superación de límite (off-by-one) en la función QUtf8Decoder::toUnicode de Trolltech Qt3 permite a usuarios locales o remotos (dependiendo del contexto) provocar una denegación de servicio (caída) mediante una cadena Unicode manipulada que dispara un desbordamiento de búfer basado en montículo. NOTA: Qt 4 tiene el mismo error en la función QUtf8Codec::convertToUnicode, pero no es explotable.",
      },
   ],
   id: "CVE-2007-4137",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: true,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-09-18T19:17:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc",
      },
      {
         source: "secalert@redhat.com",
         url: "http://bugs.gentoo.org/show_bug.cgi?id=192472",
      },
      {
         source: "secalert@redhat.com",
         url: "http://dist.trolltech.com/developer/download/175791_3.diff",
      },
      {
         source: "secalert@redhat.com",
         url: "http://dist.trolltech.com/developer/download/175791_4.diff",
      },
      {
         source: "secalert@redhat.com",
         url: "http://fedoranews.org/updates/FEDORA-2007-221.shtml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://fedoranews.org/updates/FEDORA-2007-703.shtml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://osvdb.org/39384",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26778",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26782",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/26804",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26811",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/26857",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/26868",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/26882",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/26987",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/27053",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/27275",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/27382",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/27996",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/28021",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200710-28.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200712-08.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://securitytracker.com/id?1018688",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm",
      },
      {
         source: "secalert@redhat.com",
         url: "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2007/dsa-1426",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0883.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/481498/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/25657",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/usn-513-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/3144",
      },
      {
         source: "secalert@redhat.com",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=269001",
      },
      {
         source: "secalert@redhat.com",
         url: "https://issues.rpath.com/browse/RPL-1751",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.gentoo.org/show_bug.cgi?id=192472",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://dist.trolltech.com/developer/download/175791_3.diff",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://dist.trolltech.com/developer/download/175791_4.diff",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://fedoranews.org/updates/FEDORA-2007-221.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://fedoranews.org/updates/FEDORA-2007-703.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/39384",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26778",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26782",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26804",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26811",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26857",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26868",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26882",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26987",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/27053",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/27275",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/27382",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/27996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200710-28.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200712-08.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1018688",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2007/dsa-1426",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0883.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/481498/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/25657",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-513-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/3144",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=269001",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.rpath.com/browse/RPL-1751",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-10-01 05:17
Modified
2025-04-09 00:30
Severity ?
Summary
The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.
Impacted products
Vendor Product Version
redhat fedora 7
ntfs-3g ntfs-3g *
ubuntu ubuntu_linux 7.10
ntfs-3g ntfs-3g *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE2027FA-357A-4BE3-9043-6DE8307C040A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ntfs-3g:ntfs-3g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED638D1A-D4AB-4070-8D29-C18741D9F98F",
                     versionEndIncluding: "1.913-1.fc7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ntfs-3g:ntfs-3g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBCA444C-CDF1-44A5-A00B-4258F8657B09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.",
      },
      {
         lang: "es",
         value: "El paquete ntfs-3g anterior a 1.913-2.fc7 en Fedora 7, y en el paquete kntfs-3g package en Ubuntu 7.10/Gutsy, asigna de forma incorrecta los permisos (setuid root) en mount.ntfs-3g, el cual permite a usuarios locales siendo miembros de fuse leer y escribir dispositivos de bloque de su elección, posiblemente afectando a un descriptor de fichero débil.",
      },
   ],
   id: "CVE-2007-5159",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-10-01T05:17:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26938",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26938",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) \"body[p\", (2) \"binary[p\", or (3) \"binary[p\") that cause an index increment error that leads to an out-of-bounds memory corruption.",
      },
      {
         lang: "es",
         value: "El procesador de argumentos de la orden FETCH de Cyrus IMAP Server 2.2.x a 2.2.8 permite a usuarios remotos autenticados ejecutar código de su elección mediante ciertos comandos como (1) \"body[p\", (2) \"binary[p\", o (3) \"binary[p\" que producen un error de incremento de índice que conduce a una corrupción de memoria fuera de límites.",
      },
   ],
   id: "CVE-2004-1013",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
      },
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/13274/",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/152004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2004/dsa-597",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-31-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/13274/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/152004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2004/dsa-597",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-31-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-05-13 23:19
Modified
2025-04-09 00:30
Severity ?
Summary
MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 7.04
moinmoin moinmoin *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "33904E65-D50D-4EAE-885D-FE2EBF535F18",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A940B9-A553-4A0B-8ECF-52FD26894285",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:moinmoin:moinmoin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3DEE5B-FDEA-45E0-9734-E1BF90858A34",
                     versionEndIncluding: "1.5.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.",
      },
      {
         lang: "es",
         value: "MoinMoin anterior a 20070507 no impone ACLs para calendarios e inclusiones(includes), lo cual permite a atacantes remotos leer ciertas páginas a través de vectores no especificados.",
      },
   ],
   id: "CVE-2007-2637",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-05-13T23:19:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://osvdb.org/36269",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/25208",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/29262",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2008/dsa-1514",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-458-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/36269",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/25208",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/29262",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2008/dsa-1514",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-458-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
1996-07-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110763404701519&w=2
cve@mitre.orghttp://secunia.com/advisories/14357
cve@mitre.orghttp://secunia.com/advisories/17063
cve@mitre.orghttp://secunia.com/advisories/17532
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf
cve@mitre.orghttp://www.debian.org/security/2005/dsa-664
cve@mitre.orghttp://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391Exploit
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:032
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-073.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-080.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-806.html
cve@mitre.orghttp://www.trustix.org/errata/2005/0003/
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/19167
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110763404701519&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/14357
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17063
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17532
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-664
af854a3a-2127-422b-91ae-364da2661108http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:032
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-073.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-080.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-806.html
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2005/0003/
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/19167
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "27C9E23D-AB82-4AE1-873E-C5493BB96AA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B3DB31-3998-4B75-A972-0F2675ACCA2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "37145402-6EC5-4700-8863-CE563A4F37F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C62EF915-CA7C-4D75-BC67-E015772BB9CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.",
      },
   ],
   evaluatorSolution: "Fixed in rev 1.3 of cpio/main.c.",
   id: "CVE-1999-1572",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "1996-07-16T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/14357",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/17063",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/17532",
      },
      {
         source: "cve@mitre.org",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2005/dsa-664",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-073.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-080.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-806.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2005/0003/",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/14357",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/17063",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/17532",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-664",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-073.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-080.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-806.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2005/0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-02-23 21:28
Modified
2025-04-09 00:30
Severity ?
Summary
The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:*:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "7C80A2AF-B598-46D0-B54A-DC6C804518B2",
                     versionEndIncluding: "5.10",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:*:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "C78F7413-DD84-4198-B893-5D9C068ADA5D",
                     versionEndIncluding: "6.06_lts",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:*:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "60D1D7AB-363F-413D-A5F5-0E7C41446042",
                     versionEndIncluding: "6.10",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4944FD3F-3DAA-4DCD-8F3B-ECDF55AFA726",
                     versionEndIncluding: "0.92.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.",
      },
      {
         lang: "es",
         value: "La extensión enigmail anterior 0.94.2 no maneja adecuadamente los ficheros adjuntos encriptados al e-mail, lo cual permite a atacantes remotos provocar denegación de servicio (caida), como se demostró con Mozilla Thunderbird.",
      },
   ],
   id: "CVE-2006-5877",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-02-23T21:28:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730",
      },
      {
         source: "cve@mitre.org",
         url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/22684",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-427-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/22684",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-427-1",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-04-27 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
References
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:041
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:042
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:043
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:044
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:052
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:056
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-034.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-053.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-057.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-132.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-213.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/11501Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17818
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:041
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:042
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:043
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:044
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:056
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-034.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-053.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-057.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-132.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-213.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11501Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107
Impacted products
Vendor Product Version
ascii ptex 3.1.4
cstex cstetex 2.0.2
easy_software_products cups 1.0.4
easy_software_products cups 1.0.4_8
easy_software_products cups 1.1.1
easy_software_products cups 1.1.4
easy_software_products cups 1.1.4_2
easy_software_products cups 1.1.4_3
easy_software_products cups 1.1.4_5
easy_software_products cups 1.1.6
easy_software_products cups 1.1.7
easy_software_products cups 1.1.10
easy_software_products cups 1.1.12
easy_software_products cups 1.1.13
easy_software_products cups 1.1.14
easy_software_products cups 1.1.15
easy_software_products cups 1.1.16
easy_software_products cups 1.1.17
easy_software_products cups 1.1.18
easy_software_products cups 1.1.19
easy_software_products cups 1.1.19_rc5
easy_software_products cups 1.1.20
gnome gpdf 0.110
gnome gpdf 0.112
gnome gpdf 0.131
kde koffice 1.3
kde koffice 1.3.1
kde koffice 1.3.2
kde koffice 1.3.3
kde koffice 1.3_beta1
kde koffice 1.3_beta2
kde koffice 1.3_beta3
kde kpdf 3.2
pdftohtml pdftohtml 0.32a
pdftohtml pdftohtml 0.32b
pdftohtml pdftohtml 0.33
pdftohtml pdftohtml 0.33a
pdftohtml pdftohtml 0.34
pdftohtml pdftohtml 0.35
pdftohtml pdftohtml 0.36
sgi propack 3.0
tetex tetex 1.0.6
tetex tetex 1.0.7
tetex tetex 2.0
tetex tetex 2.0.1
tetex tetex 2.0.2
xpdf xpdf 0.90
xpdf xpdf 0.91
xpdf xpdf 0.92
xpdf xpdf 0.93
xpdf xpdf 1.0
xpdf xpdf 1.0a
xpdf xpdf 1.1
xpdf xpdf 2.0
xpdf xpdf 2.1
xpdf xpdf 2.3
xpdf xpdf 3.0
sgi advanced_linux_environment 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
debian debian_linux 3.0
gentoo linux *
kde kde 3.2
kde kde 3.2.1
kde kde 3.2.2
kde kde 3.2.3
kde kde 3.3
kde kde 3.3.1
mandrakesoft mandrake_linux_corporate_server 3.0
mandrakesoft mandrake_linux_corporate_server 3.0
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat fedora_core core_1.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat linux 9.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
suse suse_linux 1.0
suse suse_linux 2.0
suse suse_linux 3.0
suse suse_linux 4.0
suse suse_linux 4.2
suse suse_linux 4.3
suse suse_linux 4.4
suse suse_linux 4.4.1
suse suse_linux 5.0
suse suse_linux 5.1
suse suse_linux 5.2
suse suse_linux 5.3
suse suse_linux 6.0
suse suse_linux 6.1
suse suse_linux 6.1
suse suse_linux 6.2
suse suse_linux 6.3
suse suse_linux 6.3
suse suse_linux 6.3
suse suse_linux 6.4
suse suse_linux 6.4
suse suse_linux 6.4
suse suse_linux 6.4
suse suse_linux 7.0
suse suse_linux 7.0
suse suse_linux 7.0
suse suse_linux 7.0
suse suse_linux 7.0
suse suse_linux 7.1
suse suse_linux 7.1
suse suse_linux 7.1
suse suse_linux 7.1
suse suse_linux 7.1
suse suse_linux 7.2
suse suse_linux 7.2
suse suse_linux 7.3
suse suse_linux 7.3
suse suse_linux 7.3
suse suse_linux 7.3
suse suse_linux 8.0
suse suse_linux 8.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.1
suse suse_linux 9.2
suse suse_linux 9.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ascii:ptex:3.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE020D3-0F38-4F53-AFB7-B4E98EAC659F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cstex:cstetex:2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E16058D9-AC8B-4A7C-865F-93B476348363",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "68BD578F-CCAD-4515-9205-EB4F297C6DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "734D0C2C-F71F-461A-87EE-202C6B706753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F0F402D-5CD0-4477-8B59-C753CECB02BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*",
                     matchCriteriaId: "959F7AFA-ED20-434C-993F-06C2A8574662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4F5A0A4-2884-46CA-A846-8B954EB80CFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "35E65857-12C7-49DE-AD27-3CACD456231C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "47CEF035-57A6-470B-916A-E5562C28E866",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E26BB15-4CF8-4496-A7F7-EB34C444EF72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "D414984E-4F6B-4278-8346-968587E4B18E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "33C36DCB-2FDD-44E6-85E8-875575AAE69E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4B7C23-0C54-4FBA-A774-9CC1E148376E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "A786A770-919E-4E23-949D-D836F316618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "00A2249C-73DE-434E-A41F-4EDB0ADC0845",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*",
                     matchCriteriaId: "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB7653F1-70E2-423F-A6A9-30333644B506",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnome:gpdf:0.110:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CB6AE42-D493-43E5-A97C-76C8450E5881",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E70576E-C253-4F8B-A93E-14CC2EE7114D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*",
                     matchCriteriaId: "832C5512-B473-40E8-BF4F-EC6ABFE46749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "053435DD-BFDF-4C39-9919-11C42D569085",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9BB1A3C-3348-4545-A513-E504B33F72AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD45E2C8-0B0E-484F-8050-94BF77798183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EAA654E-9DD4-4614-92D7-EF4D676B3A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*",
                     matchCriteriaId: "89C96FC9-40DB-467D-A701-49F97A1B887D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*",
                     matchCriteriaId: "76128BDC-2CA7-4AE7-8C4F-BCB3835CA938",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B2517C7-27EF-4961-91C3-CA33219AFF2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE346726-71D6-438B-B600-A7E107332816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*",
                     matchCriteriaId: "87E85020-B4DB-4011-BDD0-1C8967D45A84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*",
                     matchCriteriaId: "8189A9AB-F685-40E2-944F-8BD3DD6FA0A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*",
                     matchCriteriaId: "C33B8585-FA5F-4210-A997-615BCEE1726F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4AE4C34-C497-426F-AC0D-1805A50582EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2989EFF-07B9-4EF2-B6C1-59E4F52FDC92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3970101-5E83-49FD-BCB6-D9176D46B5A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "29DC217F-C257-4A3C-9CBD-08010C30BEC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:1.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "739A56F5-B19A-4B92-B9CB-04ECE4FFE204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CC6233-E207-40CC-81FF-A8670EEA4295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*",
                     matchCriteriaId: "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*",
                     matchCriteriaId: "0304E1E3-8766-40D0-8879-A652B4E9E72D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*",
                     matchCriteriaId: "188F1343-8082-4B54-8DA4-E344818ABD52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "354487CF-0086-4AE2-872B-0032E3EB89EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1169B802-7279-437F-AF59-621A67DC92EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:sgi:advanced_linux_environment:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A05AC3EE-6292-4ECC-9680-048A12FCE723",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
                     matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
                     matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
                     matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
                     matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
                     matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
                     matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
                     matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
                     matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82F69843-978D-4686-BC5B-1D09DA4A21BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACEE0AED-7918-41E9-A902-AC4070E03132",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E19472-47B4-4398-A188-CA5A5D3E7060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D17407A2-089E-43A5-9BD5-EFF966F5CC16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C4B436D-8D6A-473E-B707-26147208808B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E26B353-4985-4116-B97A-5767CDC732F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
                     matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "02EE2D72-B1E6-4380-80B0-E40A23DDD115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "111575DE-98A2-4C54-BDE1-CACC74D22B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1976D15D-9EE6-4A49-B59F-34F0505FD5BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "962FC8D7-BE5D-4E7D-9ADC-511681C593BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "451453AC-65FF-4E3B-9AC1-2DDB2E2182E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7716120D-5110-42B0-A574-9AA2AC8D3C32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB4C8426-CAF2-4366-94C0-1BA1C544FB6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CC7D746-B98B-4FAF-B816-57222759A344",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "830D48B8-D21D-4D31-99A1-20C231804DBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C0BBDD2-9FF9-4CB7-BCAF-D4AF15DC2C7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1C826AA-6E2F-4DAC-A7A2-9F47729B5DA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCC94EF9-5872-402F-B2FC-06331A924BB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F163E145-09F7-4BE2-9B46-5B6713070BAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "124E1802-7984-45ED-8A92-393FC20662FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "C7F08806-9458-439A-8EAE-2553122262ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B67020A-6942-4478-B501-764147C4970D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AD0FF64-05DF-48C2-9BB5-FD993121FB2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E74E0A28-7C78-4160-8BCF-99605285C0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "76159C25-0760-47CB-AFCE-28306CDEA830",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7786607A-362E-4817-A17E-C76D6A1F737D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*",
                     matchCriteriaId: "8A206E1C-C2EC-4356-8777-B18D7069A4C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "6E2FE291-1142-4627-A497-C0BB0D934A0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "49BC7C7E-046C-4186-822E-9F3A2AD3577B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9E7D75A-333E-4C63-9593-F64ABA5D1CE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "2FE69F6F-6B17-4C87-ACA4-A2A1FB47206A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "467A30EB-CB8F-4928-AC8F-F659084A9E2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "714C1439-AB8E-4A8B-A783-D60E9DDC38D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "62CAE5B0-4D46-4A93-A343-C8E9CB574C62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "819868A7-EB1E-4CA9-8D71-72F194E5EFEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*",
                     matchCriteriaId: "FB647A8B-ADB9-402B-96E1-45321C75731B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "0944FD27-736E-4B55-8D96-9F2CA9BB9B05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*",
                     matchCriteriaId: "373BB5AC-1F38-4D0A-97DC-08E9654403EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "B5E71DA3-F4A0-46AF-92A2-E691C7A65528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0519FF7D-363E-4530-9E63-6EA3E88432DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*",
                     matchCriteriaId: "1975A2DD-EB22-4ED3-8719-F78AA7F414B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAE3FF4F-646F-4E05-A08A-C9399DEF60F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "19F606EE-530F-4C06-82DB-52035EE03FA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "A0E896D5-0005-4E7E-895D-B202AFCE09A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "5A8B313F-93C7-4558-9571-DE1111487E17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "D5F98B9A-880E-45F0-8C16-12B22970F0D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.",
      },
      {
         lang: "es",
         value: "El parche para corregir las vulnerabilidades de desbordamiento de entero en Xpdf 2.0 y 3.0 (CAN-2004-0888) es incompleto para arquitecturas de 64 bits en ciertas distribuciones de Linux como Red Hat, lo que podría dejar a los usuarios de Xpdf expuestos a las vulnerabilidades originales.",
      },
   ],
   id: "CVE-2005-0206",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: true,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-04-27T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-034.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-053.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-057.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-132.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-213.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11501",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-034.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-053.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-057.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-132.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-213.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11501",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
References
cve@mitre.orghttp://gaim.sourceforge.net/security/?id=9Vendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200410-23.xml
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-604.htmlVendor Advisory
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2188
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17786
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17787
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17790
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790
cve@mitre.orghttps://www.ubuntu.com/usn/usn-8-1/
af854a3a-2127-422b-91ae-364da2661108http://gaim.sourceforge.net/security/?id=9Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-604.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2188
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17786
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17787
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17790
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-8-1/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D1EE775-471F-4D9F-9635-41CB581168D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E56639E-2F96-4110-8846-0EA887D2967B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2FDCAE1-0B5D-449F-A83A-5028E7701109",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*",
                     matchCriteriaId: "F984C4C7-6431-48DD-A0E0-0DC5F6052EB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*",
                     matchCriteriaId: "E955A141-DAEB-40EA-BE35-A5EED928E030",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3F02AE7-7A9C-4219-9472-9FAC8CBC637B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*",
                     matchCriteriaId: "E94CDB8A-7120-41C6-95AF-5DBAD74F3204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A3A068-BEBB-4E31-9CAD-4A2008CFBC91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA529226-9252-41EE-8543-692F3119CF6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6FDD0E8-D0CB-4B4C-8E4C-A4979B116CC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*",
                     matchCriteriaId: "7366C749-E27C-422C-BFE0-DCC4B4D9C8AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*",
                     matchCriteriaId: "5622F4C0-43C8-44B1-A7C7-D3A7F1199FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A2E8C61-B01A-482A-9B8D-0072AB6BB7DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*",
                     matchCriteriaId: "30E40E9A-950B-4D6E-A748-5F76F7B97AEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4FF2E49-7561-461A-98BD-4778C6764020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*",
                     matchCriteriaId: "4168D220-61A9-4E9F-A5A8-4832822E35EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*",
                     matchCriteriaId: "253631B3-8A0C-48DC-851A-F5A6AB490BCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*",
                     matchCriteriaId: "1266BD64-E19D-4686-9E00-42CC9AF94756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*",
                     matchCriteriaId: "C62BCA03-A187-432B-B2B3-40DE99A9986C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*",
                     matchCriteriaId: "92762951-6F9E-426D-8157-55C65A561417",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*",
                     matchCriteriaId: "00AFDEF5-5E42-4BF6-8EC6-FE7FCD4DD4AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A4B3DA2-9ECB-454D-8775-9571B158007F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*",
                     matchCriteriaId: "A041E262-E36F-44C3-B83B-2E79653B74EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*",
                     matchCriteriaId: "333D0BA1-7676-417D-BB92-AAA1AAED2D0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF449EC2-A6F2-405F-BEE7-0516E092E6F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*",
                     matchCriteriaId: "840C5668-D951-4A62-B555-EB3D91A08B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC715625-C4E7-49AC-9F3E-7306114878D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8834643-F682-4FC1-93DE-BE4754E993AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*",
                     matchCriteriaId: "42DC59A0-4BD8-42AC-B2E0-BFC32FCE7396",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.78:*:*:*:*:*:*:*",
                     matchCriteriaId: "5414E26C-C4BD-4E88-A9F4-05312F303BC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.82:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4A65A06-A2D9-4ACD-A19A-5CC0D6636139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:0.82.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3EF25C4-A89D-4FBC-8EBE-89B502369A7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "43BC7CF5-118A-4127-BA07-749179FA5A92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rob_flynn:gaim:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE70BCCA-A025-4F93-A773-8D4FF482540A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29C5A03-A7C9-4780-BB63-CF1E874D018D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1CB2DD9-E77F-46EE-A145-F87AD10EA8E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an \"unexpected sequence of MSNSLP messages\" that results in an unbounded copy operation that writes to the wrong buffer.",
      },
   ],
   id: "CVE-2004-0891",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-27T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://gaim.sourceforge.net/security/?id=9",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-604.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-8-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://gaim.sourceforge.net/security/?id=9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2004-604.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-8-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
Impacted products
Vendor Product Version
gnu gettext 0.14.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gnu:gettext:0.14.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2117E41A-5CB2-47C9-A390-E87C35D59BE4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.",
      },
   ],
   id: "CVE-2004-0966",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-02-09T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11282",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2004/0050",
      },
      {
         source: "cve@mitre.org",
         url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-5-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11282",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2004/0050",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-5-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.",
      },
      {
         lang: "es",
         value: "Condición de carrera en SELinux 2.6.x a 2.6.9 permite a usuarios locales causar una denegación de servicio (caída del kernel) mediante SOCK_SEQPACKET unix domain sockets, que no son manejados adecuadamente en la función sock_dgram_sendmsg.",
      },
   ],
   id: "CVE-2004-1069",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 1.2,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:H/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=linux-kernel&m=110045613004761",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=linux-kernel&m=110045613004761",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-12-07 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc
cve@mitre.orghttp://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
cve@mitre.orghttp://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html
cve@mitre.orghttp://secunia.com/advisories/23245Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23250Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23255Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23259
cve@mitre.orghttp://secunia.com/advisories/23269Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23284
cve@mitre.orghttp://secunia.com/advisories/23290
cve@mitre.orghttp://secunia.com/advisories/23299
cve@mitre.orghttp://secunia.com/advisories/23303
cve@mitre.orghttp://secunia.com/advisories/23329
cve@mitre.orghttp://secunia.com/advisories/23335
cve@mitre.orghttp://secunia.com/advisories/23513
cve@mitre.orghttp://secunia.com/advisories/24047
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200612-03.xml
cve@mitre.orghttp://securitytracker.com/id?1017349
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2007-047.htm
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1231
cve@mitre.orghttp://www.kb.cert.org/vuls/id/427009US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:228
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_28_sr.html
cve@mitre.orghttp://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0754.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/453664/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/453723/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/21462Vendor Advisory
cve@mitre.orghttp://www.trustix.org/errata/2006/0070
cve@mitre.orghttp://www.ubuntu.com/usn/usn-393-1Patch
cve@mitre.orghttp://www.ubuntu.com/usn/usn-393-2
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4881
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/30711
cve@mitre.orghttps://issues.rpath.com/browse/RPL-835
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23245Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23250Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23255Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23259
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23269Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23290
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23299
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23303
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23329
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23335
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23513
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24047
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200612-03.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017349
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1231
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/427009US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:228
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_28_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0754.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/453664/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/453723/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21462Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0070
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-393-1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-393-2
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4881
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/30711
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-835
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "76CAFD24-E53F-488C-BD9F-BE31D30828AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5D3628A-3BDD-4C6F-AE7D-C81FC3EE1630",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "74589745-A9A6-44DB-B4F0-B61B663ECA21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB2B99CB-5950-42E7-ACD5-38457CBE9095",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D81AF47A-56BA-4D90-A4D4-D7A37333A117",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E55DBB73-EF6C-4C46-9E5A-7C35D7FD190C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "205C014A-236B-44CF-A92D-B4D6392FF9A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F412ECF0-DA84-47B8-98FD-06019C9E63E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE04D970-A467-4648-B99C-895BA8BEE79B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C79DC753-35CB-46FA-BDE4-650BD1730505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F54DA969-ABAA-4021-9EC3-C30A45D1A7ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1B68B13-DC1F-46AB-B360-D04E48A0939F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE65D839-7798-4DE4-AA89-765E91FC6A42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B256D201-D3E1-472F-8B4F-8D6D5D763003",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1151E8-E9D3-4244-9765-B06D07848AFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.9.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "345FBFB9-7FA3-4F7D-B605-A38054744F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:1.9.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "859126BF-7327-4C54-AE2E-4A961911C937",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7461ED0D-1DC2-4019-BEC0-2E9AF2724371",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:privacy_guard:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C3FA38E-5BF1-4CDA-AB4F-19150FD3EE10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gpg4win:gpg4win:1.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "047F3D25-1795-494A-93AC-9AF80AC72680",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3B94B6-A5E4-4432-802E-BFAD7F3B5B4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E007512B-2A01-4915-82D1-EDDEE8ED3190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2B66383-4124-4579-BC8E-36DBE7ABB543",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "74022B69-6557-4746-9080-24E4DDA44026",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE3B4BE-7B43-47C7-823A-C019DF12498F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD9460AD-229A-4DC2-BFBA-818640A464AD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A \"stack overwrite\" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de \"escritura en pila\" en GnuPG (gpg) 1.x anterior a la 1.4.6, 2.x anterior a la 2.0.2 y 1.9.0 hasta la 1.9.95 permite a atacantes ejecutar código de su elección mediante paquetes OpenPGP artesanales que provocan que GnuPG haga referencia a un puntero a función que está en memoria (en la pila) que ya ha sido liberada.",
      },
   ],
   id: "CVE-2006-6235",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-12-07T11:28:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/23245",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/23250",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/23255",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23259",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/23269",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23284",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23290",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23299",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23303",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23329",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23335",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/23513",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/24047",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-200612-03.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1017349",
      },
      {
         source: "cve@mitre.org",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1231",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/427009",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/21462",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2006/0070",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-393-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/usn-393-2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2006/4881",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711",
      },
      {
         source: "cve@mitre.org",
         url: "https://issues.rpath.com/browse/RPL-835",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/23245",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/23250",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/23255",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23259",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/23269",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23284",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23290",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23299",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23303",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23329",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23335",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23513",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24047",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200612-03.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1017349",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1231",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/427009",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/21462",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2006/0070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-393-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-393-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.rpath.com/browse/RPL-835",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-04-06 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
References
secalert@redhat.comhttp://issues.foresightlinux.org/browse/FL-223
secalert@redhat.comhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501Patch
secalert@redhat.comhttp://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
secalert@redhat.comhttp://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2007-0125.html
secalert@redhat.comhttp://secunia.com/advisories/24741Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24745
secalert@redhat.comhttp://secunia.com/advisories/24756
secalert@redhat.comhttp://secunia.com/advisories/24758
secalert@redhat.comhttp://secunia.com/advisories/24765
secalert@redhat.comhttp://secunia.com/advisories/24768
secalert@redhat.comhttp://secunia.com/advisories/24770Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24771
secalert@redhat.comhttp://secunia.com/advisories/24772
secalert@redhat.comhttp://secunia.com/advisories/24776
secalert@redhat.comhttp://secunia.com/advisories/24791
secalert@redhat.comhttp://secunia.com/advisories/24885
secalert@redhat.comhttp://secunia.com/advisories/24889
secalert@redhat.comhttp://secunia.com/advisories/24921
secalert@redhat.comhttp://secunia.com/advisories/24996
secalert@redhat.comhttp://secunia.com/advisories/25004
secalert@redhat.comhttp://secunia.com/advisories/25006
secalert@redhat.comhttp://secunia.com/advisories/25096
secalert@redhat.comhttp://secunia.com/advisories/25195
secalert@redhat.comhttp://secunia.com/advisories/25216
secalert@redhat.comhttp://secunia.com/advisories/25305
secalert@redhat.comhttp://secunia.com/advisories/25495
secalert@redhat.comhttp://secunia.com/advisories/28333
secalert@redhat.comhttp://secunia.com/advisories/30161
secalert@redhat.comhttp://secunia.com/advisories/33937
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200705-02.xml
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200705-10.xml
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733
secalert@redhat.comhttp://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954
secalert@redhat.comhttp://sourceforge.net/project/shownotes.php?release_id=498954
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
secalert@redhat.comhttp://support.apple.com/kb/HT3438
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2007-193.htm
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1294
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1454
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:079
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:080
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:081
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2007_27_x.html
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2007_6_sr.html
secalert@redhat.comhttp://www.openbsd.org/errata39.html#021_xorg
secalert@redhat.comhttp://www.openbsd.org/errata40.html#011_xorg
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0126.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0132.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0150.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/464686/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/464816/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/23283Patch
secalert@redhat.comhttp://www.securityfocus.com/bid/23300
secalert@redhat.comhttp://www.securityfocus.com/bid/23402
secalert@redhat.comhttp://www.securitytracker.com/id?1017857
secalert@redhat.comhttp://www.trustix.org/errata/2007/0013/
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-448-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1217
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1264
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1548
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/33417
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1213
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810
af854a3a-2127-422b-91ae-364da2661108http://issues.foresightlinux.org/browse/FL-223
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2007-0125.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24741Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24745
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24756
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24758
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24765
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24768
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24770Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24771
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24772
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24776
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24791
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24885
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24889
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24921
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24996
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25004
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25006
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25096
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25195
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25305
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25495
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28333
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30161
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33937
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200705-02.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200705-10.xml
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=498954
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3438
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1294
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1454
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:081
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_27_x.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_6_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata39.html#021_xorg
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata40.html#011_xorg
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0126.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0132.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0150.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/464686/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/464816/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23283Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23300
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23402
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017857
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0013/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-448-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1217
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1264
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1548
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33417
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1213
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "EF15862D-6108-4791-8817-622123C8D10C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "F1672825-AB87-4402-A628-B33AE5B7D4C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*",
                     matchCriteriaId: "939216D8-9E6C-419E-BC0A-EC7F0F29CE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "E520564E-964D-4758-945B-5EF0C35E605C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "2294D5A7-7B36-497A-B0F1-514BC49E1423",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "AB80939E-8B58-48B6-AFB7-9CF518C0EE1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*",
                     matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "61B11116-FA94-4989-89A1-C7B551D5195A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFADBA5A-8168-40B8-B5CA-0F1F7F9193D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "837EBF15-6C7D-46B8-8A90-9DFBF2C09FF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E859A205-0DC2-4E28-8FF0-72D66DE9B280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18E8C7B-53AC-4BC7-9E00-A70293172B58",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DD12BC0-1E50-49C6-AD0D-8CE90F0E8449",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
                     matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*",
                     matchCriteriaId: "FE524195-06F1-4504-9223-07596588CC70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*",
                     matchCriteriaId: "2FEED00F-3B70-4E57-AD80-7903AECED14B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*",
                     matchCriteriaId: "40D71CBC-D365-4710-BAB5-8A1159F35E41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
                     matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC77812C-D84E-493E-9D21-1BA6C2129E70",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*",
                     matchCriteriaId: "02362C25-B373-4FB1-AF4A-2AFC7F7D4387",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "19AD5F8D-6EB9-4E4B-9E82-FFBAB68797E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F65351-C2DA-41C0-A3F9-1AE951E4386E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "1B795F9F-AFB3-4A2A-ABC6-9246906800DE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "77FF1412-A7DA-4669-8AE1-5A529AB387FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.",
      },
      {
         lang: "es",
         value: "Desbordamiento de enteros en la función bdfReadCharacters en (1) X.Org libXfont before 20070403 y (2) freetype 2.3.2 y permite a usuarios remotos validados ejecutar código de su elección a través de fuentes manipuladas BDF, las cueles dan como resultado un desbordamiento de pila.",
      },
   ],
   id: "CVE-2007-1351",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 8.5,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-04-06T01:19:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://issues.foresightlinux.org/browse/FL-223",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24741",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24745",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24756",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24758",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24765",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24768",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24770",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24771",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24772",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24776",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24791",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24885",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24889",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24921",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24996",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25004",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25006",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25096",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25195",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25216",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25305",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25495",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/28333",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/30161",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/33937",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200705-02.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sourceforge.net/project/shownotes.php?release_id=498954",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.apple.com/kb/HT3438",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2007/dsa-1294",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2008/dsa-1454",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openbsd.org/errata39.html#021_xorg",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openbsd.org/errata40.html#011_xorg",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/23283",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/23300",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/23402",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securitytracker.com/id?1017857",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.trustix.org/errata/2007/0013/",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/usn-448-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/1217",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/1264",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/1548",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417",
      },
      {
         source: "secalert@redhat.com",
         url: "https://issues.rpath.com/browse/RPL-1213",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://issues.foresightlinux.org/browse/FL-223",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24741",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24745",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24756",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24758",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24765",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24768",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/24770",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24771",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24772",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24776",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24791",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24885",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24889",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24921",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25004",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25006",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25096",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25195",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25216",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25305",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25495",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28333",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33937",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200705-02.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200705-10.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sourceforge.net/project/shownotes.php?release_id=498954",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.apple.com/kb/HT3438",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2007/dsa-1294",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2008/dsa-1454",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2007_27_x.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openbsd.org/errata39.html#021_xorg",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openbsd.org/errata40.html#011_xorg",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/23283",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/23300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/23402",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1017857",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2007/0013/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-448-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/1217",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/1264",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/1548",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.rpath.com/browse/RPL-1213",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-189",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.",
      },
      {
         lang: "es",
         value: "Desbordamiento basado en la pila en Cyrus IMAP Server 2.2.4 a 2.2.8, con la opción imapmagicplus establecida, permite a atacantes remotos ejecuta código de su elección mediante un comando PROXY o LOGIN largo, una vulnerabilidad distinta de CAN-2004-1015.",
      },
   ],
   id: "CVE-2004-1011",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
      },
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/13274/",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/152004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/13274/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/152004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2005-357.html
cve@mitre.orghttp://secunia.com/advisories/18100
cve@mitre.orghttp://secunia.com/advisories/21253
cve@mitre.orghttp://secunia.com/advisories/22033
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
cve@mitre.orghttp://www.debian.org/security/2005/dsa-752
cve@mitre.orghttp://www.osvdb.org/15487
cve@mitre.orghttp://www.securityfocus.com/archive/1/394965Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/12996Patch
cve@mitre.orghttp://www.securityfocus.com/bid/19289
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA06-214A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3101
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2005-357.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18100
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21253
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22033
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-752
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/15487
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/394965Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12996Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19289
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA06-214A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3101
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765
Impacted products
Vendor Product Version
gnu gzip 1.2.4
gnu gzip 1.2.4a
gnu gzip 1.3.3
freebsd freebsd 4.0
freebsd freebsd 4.0
freebsd freebsd 4.0
freebsd freebsd 4.1
freebsd freebsd 4.1.1
freebsd freebsd 4.1.1
freebsd freebsd 4.1.1
freebsd freebsd 4.2
freebsd freebsd 4.2
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6.2
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
freebsd freebsd 5.2.1
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.4
freebsd freebsd 5.4
freebsd freebsd 5.4
gentoo linux *
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux_desktop 3.0
redhat enterprise_linux_desktop 4.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
trustix secure_linux 2.0
trustix secure_linux 2.1
trustix secure_linux 2.2
turbolinux turbolinux_appliance_server 1.0_hosting
turbolinux turbolinux_appliance_server 1.0_workgroup
turbolinux turbolinux_desktop 10.0
turbolinux turbolinux_home *
turbolinux turbolinux_server 7.0
turbolinux turbolinux_server 8.0
turbolinux turbolinux_server 10.0
turbolinux turbolinux_workstation 7.0
turbolinux turbolinux_workstation 8.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D50385A-1D5D-4517-B5FA-1BB60BA4C484",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*",
                     matchCriteriaId: "752BDD31-53A2-4246-8E95-77694548DB2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "079F39E2-69BF-47AC-87CF-A47D37EA27F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0A585A1-FF82-418F-90F8-072458DB7816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "E3F7EB61-55A5-4776-B0E7-3508920A6CEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*",
                     matchCriteriaId: "A442DE97-4485-4D95-B95D-58947585E455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE31DFF8-06AB-489D-A0C5-509C090283B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "1E8A6564-129A-4555-A5ED-6F65C56AE7B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*",
                     matchCriteriaId: "237174A4-E030-4A0B-AD0B-5C463603EAA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF49BF03-C25E-4737-84D5-892895C86C58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*",
                     matchCriteriaId: "5D7F8F11-1869-40E2-8478-28B4E946D3CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2019E0E-426B-43AF-8904-1B811AE171E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*",
                     matchCriteriaId: "9062BAB5-D437-49BE-A384-39F62434B70B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*",
                     matchCriteriaId: "3BA1504C-14FE-4C21-A801-944041F2946F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*",
                     matchCriteriaId: "21B69535-4FB6-4FAD-AAA6-C790FF82EFAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*",
                     matchCriteriaId: "6E53C673-9D6D-42C8-A502-033E1FC28D97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "55C5FC1A-1253-4390-A4FC-573BB14EA937",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
                     matchCriteriaId: "6F4AC452-6042-409D-8673-ACAD108EE3B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2FE1009B-371A-48E2-A456-935A1F0B7D0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
                     matchCriteriaId: "C844A170-B5A7-4703-AF3B-67366D44EA8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "44308D13-D935-4FF8-AB52-F0E115ED1AD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
                     matchCriteriaId: "3D41CB12-7894-4D25-80EC-23C56171D973",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
                     matchCriteriaId: "9BCD9C12-EDAB-473F-9CC5-04F06B413720",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
                     matchCriteriaId: "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
                     matchCriteriaId: "09789843-6A1A-4CDB-97E8-89E82B79DDB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C001822-FDF8-497C-AC2C-B59A00E9ACD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
                     matchCriteriaId: "118211EF-CED7-4EB5-9669-F54C8169D4AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
                     matchCriteriaId: "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
                     matchCriteriaId: "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
                     matchCriteriaId: "9A405AE2-ECC4-4BB0-80DD-4736394FB217",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B86C77AB-B8FF-4376-9B4E-C88417396F3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
                     matchCriteriaId: "E5612FB0-8403-4A7E-B89A-D7BDFAC00078",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
                     matchCriteriaId: "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
                     matchCriteriaId: "AFDA151E-E614-4A24-A34D-B6D5309110CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
                     matchCriteriaId: "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*",
                     matchCriteriaId: "09BFA20B-2F31-4246-8F74-63DF1DB884EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*",
                     matchCriteriaId: "5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EAEA17-033A-4A50-8E39-D61154876D2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*",
                     matchCriteriaId: "4AE93D3D-34B4-47B7-A784-61F4479FF5A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
                     matchCriteriaId: "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FFD9D1C-A459-47AD-BC62-15631417A32F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
                     matchCriteriaId: "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
                     matchCriteriaId: "6E21E50A-A368-4487-A791-87366CC5C86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
                     matchCriteriaId: "43E84296-9B5C-4623-A2C4-431D76FC2765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
                     matchCriteriaId: "E18328E2-3CB5-4D36-8EA3-77DD909B46A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
                     matchCriteriaId: "EF73D76B-FBB8-4D10-8393-9FAF53392A4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
                     matchCriteriaId: "F177AE1C-58C2-4575-807C-ABFFC5119FA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "3B13D898-C1B6-44B9-8432-7DDB8A380E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
                     matchCriteriaId: "51A612F6-E4EB-4E34-8F55-79E16C74758E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
                     matchCriteriaId: "5C19B266-8FE7-49ED-8678-2D522257491D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "15C4D826-A419-45F5-B91C-1445DB480916",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
                     matchCriteriaId: "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                     matchCriteriaId: "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD7C441E-444B-4DF5-8491-86805C70FB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                     matchCriteriaId: "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
                     matchCriteriaId: "8E4BC012-ADE4-468F-9A25-261CD8055694",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8A80E6A-6502-4A33-83BA-7DCC606D79AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
                     matchCriteriaId: "0D6428EB-5E1A-41CB-979C-4C9402251D8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
                     matchCriteriaId: "2DCA9879-C9F5-475A-8EC9-04D151001C8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
                     matchCriteriaId: "0A94132F-4C47-49CC-B03C-8756613E9A38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*",
                     matchCriteriaId: "46A60ED5-1D92-4B40-956F-D1801CAB9039",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
                     matchCriteriaId: "3F629879-66F0-427B-86D8-D740E0E3F6E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
                     matchCriteriaId: "C89129C5-A1DB-4018-B43A-C60C8E650080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                     matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                     matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                     matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*",
                     matchCriteriaId: "1267DA81-5D2A-4F5C-BF87-F46813E21E19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*",
                     matchCriteriaId: "74CD3CFE-7780-4BDC-B318-9B2D7B3B2DC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "839D2945-1417-43F5-A526-A14C491CBCEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B484D091-62DE-4EF2-AC54-26896CA8B315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                     matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                     matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.",
      },
   ],
   id: "CVE-2005-0988",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.7,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:H/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-05-02T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://rhn.redhat.com/errata/RHSA-2005-357.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18100",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/21253",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/22033",
      },
      {
         source: "cve@mitre.org",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852",
      },
      {
         source: "cve@mitre.org",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2005/dsa-752",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/15487",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/archive/1/394965",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/12996",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/19289",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2006/3101",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2005-357.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18100",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/21253",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22033",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-752",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/15487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/archive/1/394965",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/12996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/19289",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/3101",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2008-01-17 23:00
Modified
2025-04-09 00:30
Severity ?
Summary
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=205955
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
cve@mitre.orghttp://secunia.com/advisories/28511
cve@mitre.orghttp://secunia.com/advisories/28527
cve@mitre.orghttp://secunia.com/advisories/28545
cve@mitre.orghttp://secunia.com/advisories/28705
cve@mitre.orghttp://secunia.com/advisories/28860
cve@mitre.orghttp://secunia.com/advisories/28943
cve@mitre.orghttp://secunia.com/advisories/29323
cve@mitre.orghttp://secunia.com/advisories/48099
cve@mitre.orghttp://svn.boost.org/trac/boost/changeset/42674
cve@mitre.orghttp://svn.boost.org/trac/boost/changeset/42745
cve@mitre.orghttp://wiki.rpath.com/Advisories:rPSA-2008-0063
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200802-08.xml
cve@mitre.orghttp://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032
cve@mitre.orghttp://www.securityfocus.com/archive/1/488102/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/27325
cve@mitre.orghttp://www.ubuntu.com/usn/usn-570-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0249
cve@mitre.orghttps://issues.rpath.com/browse/RPL-2143
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=205955
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28511
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28527
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28545
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28705
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28860
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28943
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29323
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48099
af854a3a-2127-422b-91ae-364da2661108http://svn.boost.org/trac/boost/changeset/42674
af854a3a-2127-422b-91ae-364da2661108http://svn.boost.org/trac/boost/changeset/42745
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2008-0063
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/488102/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27325
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-570-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0249
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2143
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 6.06_lts
ubuntu ubuntu_linux 6.10
ubuntu ubuntu_linux 7.04
ubuntu ubuntu_linux 7.10
boost boost 1.33
boost boost 1.34



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "33904E65-D50D-4EAE-885D-FE2EBF535F18",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A940B9-A553-4A0B-8ECF-52FD26894285",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7A527FE-ED5E-4C9A-823C-0D76B1885691",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9CAD8FD-3F47-4AA4-9B97-41892E58FB57",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.",
      },
      {
         lang: "es",
         value: "La función get_repeat_type en basic_regex_creator.hpp de la librería de expresiones regulares (también conocido como Boost.Regex) de Boost 1.33 y 1.34 permite a atacantes remotos dependientes de contexto provocar una denegación de servicio (referencia nula y caída) mediante una expresión regular inválida.",
      },
   ],
   id: "CVE-2008-0172",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2008-01-17T23:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugs.gentoo.org/show_bug.cgi?id=205955",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/28511",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/28527",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/28545",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/28705",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/28860",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/28943",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/29323",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/48099",
      },
      {
         source: "cve@mitre.org",
         url: "http://svn.boost.org/trac/boost/changeset/42674",
      },
      {
         source: "cve@mitre.org",
         url: "http://svn.boost.org/trac/boost/changeset/42745",
      },
      {
         source: "cve@mitre.org",
         url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/27325",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/usn-570-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2008/0249",
      },
      {
         source: "cve@mitre.org",
         url: "https://issues.rpath.com/browse/RPL-2143",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.gentoo.org/show_bug.cgi?id=205955",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28511",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28527",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28545",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28705",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28860",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/28943",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/29323",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/48099",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://svn.boost.org/trac/boost/changeset/42674",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://svn.boost.org/trac/boost/changeset/42745",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/27325",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-570-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/0249",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.rpath.com/browse/RPL-2143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4.\n\nFor Red Hat Enterprise Linux 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0172\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.",
         lastModified: "2008-05-12T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
Impacted products
Vendor Product Version
openpkg openpkg 2.1
openpkg openpkg 2.2
openpkg openpkg current
oracle mysql 3.20
oracle mysql 3.20.32a
oracle mysql 3.21
oracle mysql 3.22
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.22
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.32
oracle mysql 3.23.33
oracle mysql 3.23.34
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 3.23.54
oracle mysql 3.23.54a
oracle mysql 3.23.55
oracle mysql 3.23.56
oracle mysql 3.23.58
oracle mysql 3.23.59
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.18
oracle mysql 4.0.20
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
suse suse_linux 8.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
trustix secure_linux 1.5
trustix secure_linux 2.0
trustix secure_linux 2.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "37042CDE-E4FE-442E-891A-CD84433D36E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F6E348-01DF-4FA4-808E-39A2A7A2B97B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "578BA199-EF04-4595-AFDE-54FD66B7FC39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*",
                     matchCriteriaId: "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "B82E464F-3871-40C7-A758-B81582D193AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "05B7E2C5-6139-47F9-A310-F2BC0EF83942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "787CB28C-74C6-4356-8AB3-4183CD941EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "C30459B9-0FAC-48DF-9601-AAD1A028846F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
                     matchCriteriaId: "209E0C63-FC71-4E19-B3D5-BCB71A758252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DBBAC9-AA05-409F-82B2-A552A3417E45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "268CDE97-C837-482A-BB16-77662C45074C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E35942-7E70-468E-BA15-97CA5086C1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCB886BB-EA7C-4618-9029-BB16A45A4301",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "56EC4832-82D1-4E57-86DA-8918CA006723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A42D3C-2539-469A-81BD-8306CD7E1A12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "362893B4-9BC1-4584-ACD5-08878A19E3C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD940715-318E-44C1-8613-FEBFB8F1741A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "17187451-7715-464D-9C7B-3F949345CF2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "041AD718-39A7-4B13-90C5-680743B1C982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA2F4EA8-64A3-4E11-A6A3-5179738157D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*",
                     matchCriteriaId: "067774E4-0704-4F5D-9B46-4DE19FE51163",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
                     matchCriteriaId: "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
                     matchCriteriaId: "536F109A-7932-4424-889E-02922D8B783D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
                     matchCriteriaId: "036AE068-C061-49B1-95D1-98A09A79EE25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A83184-F554-42C0-8162-B484CBAD09D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9244622-781A-46AE-866D-0EDDE5323048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
                     matchCriteriaId: "670C3F10-A811-43D0-B762-5791D41C8B78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
                     matchCriteriaId: "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
                     matchCriteriaId: "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
                     matchCriteriaId: "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
                     matchCriteriaId: "50FC2146-5BC0-4CA6-8700-5877C01B777D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
                     matchCriteriaId: "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EFB2D10-E255-4DD3-BF03-217803CDED24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*",
                     matchCriteriaId: "436D90B0-C839-4B9F-853D-51C34459A11F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3535453-E7DC-4561-BB35-32DFF78E451C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*",
                     matchCriteriaId: "37512B4B-C428-4D30-AAF3-9557C7257967",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*",
                     matchCriteriaId: "75B1527A-5039-470B-87DC-B02F557364A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "41BEAD26-ADDC-4FC6-A493-584315183936",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "153E8DFB-4197-4117-87C6-C0FBE3C05600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "765BF98E-7AB1-45EA-9935-2C311E621211",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "22408224-0634-4CC6-888F-892E9D932CE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B2646B4-593E-4AC9-8292-1AD805632DC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "4D57E557-7F6D-4618-86AC-B10C08341900",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EC21395-4C78-4343-9452-578B24C2656D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3340604-0D38-4494-847B-E9E8B0026A28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC117BF1-3127-477A-9500-C9A32596ED8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                     matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.",
      },
   ],
   id: "CVE-2004-0957",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: true,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-02-09T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ciac.org/ciac/bulletins/p-018.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2005/dsa-707",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-597.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-611.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-32-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ciac.org/ciac/bulletins/p-018.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2005/dsa-707",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-597.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-611.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-32-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-04-14 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
cve@mitre.orghttp://isec.pl/vulnerabilities/isec-0021-uselib.txt
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110512575901427&w=2
cve@mitre.orghttp://secunia.com/advisories/20162
cve@mitre.orghttp://secunia.com/advisories/20163
cve@mitre.orghttp://secunia.com/advisories/20202
cve@mitre.orghttp://secunia.com/advisories/20338
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1067
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1069
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1070
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1082
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:022
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_01_sr.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-016.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-017.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-043.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-092.html
cve@mitre.orghttp://www.securityfocus.com/advisories/7804
cve@mitre.orghttp://www.securityfocus.com/advisories/7805
cve@mitre.orghttp://www.securityfocus.com/advisories/7806
cve@mitre.orghttp://www.securityfocus.com/bid/12190Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.trustix.org/errata/2005/0001/
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2336
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18800
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
af854a3a-2127-422b-91ae-364da2661108http://isec.pl/vulnerabilities/isec-0021-uselib.txt
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110512575901427&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20162
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20163
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20202
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20338
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1067
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1069
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1070
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1082
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_01_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-016.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-017.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-043.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-092.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/7804
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/7805
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/7806
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12190Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2005/0001/
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2336
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18800
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567
Impacted products
Vendor Product Version
avaya mn100 *
avaya network_routing *
avaya converged_communications_server 2.0
avaya s8710 r2.0.0
avaya s8710 r2.0.1
avaya modular_messaging_message_storage_server 1.1
avaya modular_messaging_message_storage_server 2.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.1
linux linux_kernel 2.4.2
linux linux_kernel 2.4.3
linux linux_kernel 2.4.4
linux linux_kernel 2.4.5
linux linux_kernel 2.4.6
linux linux_kernel 2.4.7
linux linux_kernel 2.4.8
linux linux_kernel 2.4.9
linux linux_kernel 2.4.10
linux linux_kernel 2.4.11
linux linux_kernel 2.4.12
linux linux_kernel 2.4.13
linux linux_kernel 2.4.14
linux linux_kernel 2.4.15
linux linux_kernel 2.4.16
linux linux_kernel 2.4.17
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.20
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.22
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23_ow2
linux linux_kernel 2.4.24
linux linux_kernel 2.4.24_ow1
linux linux_kernel 2.4.25
linux linux_kernel 2.4.26
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.28
linux linux_kernel 2.4.29
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.2
linux linux_kernel 2.6.3
linux linux_kernel 2.6.4
linux linux_kernel 2.6.5
linux linux_kernel 2.6.6
linux linux_kernel 2.6.6
linux linux_kernel 2.6.7
linux linux_kernel 2.6.7
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.9
linux linux_kernel 2.6.10
linux linux_kernel 2.6.10
linux linux_kernel 2.6_test9_cvs
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 9.2
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 10.1
mandrakesoft mandrake_linux 10.1
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 2.1
mandrakesoft mandrake_linux_corporate_server 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux_desktop 3.0
redhat enterprise_linux_desktop 4.0
redhat fedora_core core_1.0
redhat fedora_core core_2.0
redhat fedora_core core_3.0
redhat linux 7.3
redhat linux 9.0
suse suse_linux 1.0
suse suse_linux 8
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
avaya intuity_audix *
mandrakesoft mandrake_multi_network_firewall 8.2
avaya s8300 r2.0.0
avaya s8300 r2.0.1
avaya s8500 r2.0.0
avaya s8500 r2.0.1
avaya s8700 r2.0.0
avaya s8700 r2.0.1
conectiva linux 10.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D073442B-D7E7-4E07-AF2D-E22FE65B09A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:network_routing:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E942E0E7-0808-479C-B061-66119EBA12E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E586558A-ABC3-42EB-8B4D-DC92A0D695E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8710:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "68B1272B-8B71-4D2D-A5E4-0E7828500C22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8710:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C7B9C0-91A2-4529-B879-60DE043E719C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E25F5CF2-F891-41CA-A40C-13966F72FDF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7417958C-5321-41D6-9D1A-D16BF5511E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
                     matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
                     matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
                     matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "0AFD594E-48BA-4281-8DEE-306E3008ABB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CDE1E92-C64D-4A3B-95A2-384BD772B28B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
                     matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "9E661D58-18DF-4CCF-9892-F873618F4535",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
                     matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                     matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                     matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*",
                     matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*",
                     matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
                     matchCriteriaId: "C7EAAD04-D7C4-43DE-B488-1AAD014B503E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "D2E2EF3C-1379-4CBE-8FF5-DACD47834651",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
                     matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",
                     matchCriteriaId: "C1A3B951-A1F8-4291-82FA-AB7922D13ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4F3F3BB-E004-4FD9-9580-F2D5F3ED3701",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "20C0BD87-CE4B-49D2-89BE-EF282C43AD72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3E6C4A8-59F4-43EE-8413-E95289037598",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE76357A-27E6-4D85-9AA0-1BB658C41568",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C56C5FDB-24E2-479D-87CA-164CD28567D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.",
      },
      {
         lang: "es",
         value: "Condición de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar código de su elección manipulando el descriptor WMA.",
      },
   ],
   id: "CVE-2004-1235",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:H/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-04-14T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
      },
      {
         source: "cve@mitre.org",
         url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-043.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/advisories/7804",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/advisories/7805",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/advisories/7806",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/12190",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.org/errata/2005/0001/",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2005-043.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-092.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/advisories/7804",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/advisories/7805",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/advisories/7806",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/12190",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.org/errata/2005/0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.
Impacted products
Vendor Product Version
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.18
oracle mysql 4.0.20
suse suse_linux 8.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "41BEAD26-ADDC-4FC6-A493-584315183936",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "153E8DFB-4197-4117-87C6-C0FBE3C05600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "765BF98E-7AB1-45EA-9935-2C311E621211",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "22408224-0634-4CC6-888F-892E9D932CE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B2646B4-593E-4AC9-8292-1AD805632DC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "4D57E557-7F6D-4618-86AC-B10C08341900",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EC21395-4C78-4343-9452-578B24C2656D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
                     matchCriteriaId: "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3340604-0D38-4494-847B-E9E8B0026A28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC117BF1-3127-477A-9500-C9A32596ED8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
                     matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.",
      },
      {
         lang: "es",
         value: "MySQL anteriores a 4.0.20 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante una consulta MATCH AGAINST con comillas dobles iniciales pero sin comillas dobles de cierre.",
      },
   ],
   id: "CVE-2004-0956",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugs.mysql.com/bug.php?id=3870",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.mysql.com/packagers/202",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.trustix.net/errata/2004/0054/",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.mysql.com/bug.php?id=3870",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.mysql.com/packagers/202",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.trustix.net/errata/2004/0054/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.
References
cve@mitre.orghttp://isec.pl/vulnerabilities/isec-0019-scm.txt
cve@mitre.orghttp://secunia.com/advisories/20162
cve@mitre.orghttp://secunia.com/advisories/20163
cve@mitre.orghttp://secunia.com/advisories/20202
cve@mitre.orghttp://secunia.com/advisories/20338
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1067
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1069
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1070
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1082
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:022
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_44_kernel.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-689.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-016.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-017.html
cve@mitre.orghttp://www.securityfocus.com/bid/11921Exploit, Patch, Vendor Advisory
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2336
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18483
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816
cve@mitre.orghttps://www.ubuntu.com/usn/usn-38-1/
af854a3a-2127-422b-91ae-364da2661108http://isec.pl/vulnerabilities/isec-0019-scm.txt
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20162
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20163
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20202
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20338
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1067
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1069
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1070
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1082
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_44_kernel.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-689.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-016.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-017.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11921Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2336
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18483
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-38-1/
Impacted products
Vendor Product Version
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.0
linux linux_kernel 2.4.1
linux linux_kernel 2.4.2
linux linux_kernel 2.4.3
linux linux_kernel 2.4.4
linux linux_kernel 2.4.5
linux linux_kernel 2.4.6
linux linux_kernel 2.4.7
linux linux_kernel 2.4.8
linux linux_kernel 2.4.9
linux linux_kernel 2.4.10
linux linux_kernel 2.4.11
linux linux_kernel 2.4.12
linux linux_kernel 2.4.13
linux linux_kernel 2.4.14
linux linux_kernel 2.4.15
linux linux_kernel 2.4.16
linux linux_kernel 2.4.17
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.18
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.19
linux linux_kernel 2.4.20
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.21
linux linux_kernel 2.4.22
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23
linux linux_kernel 2.4.23_ow2
linux linux_kernel 2.4.24
linux linux_kernel 2.4.24_ow1
linux linux_kernel 2.4.25
linux linux_kernel 2.4.26
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.27
linux linux_kernel 2.4.28
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.0
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.1
linux linux_kernel 2.6.2
linux linux_kernel 2.6.3
linux linux_kernel 2.6.4
linux linux_kernel 2.6.5
linux linux_kernel 2.6.6
linux linux_kernel 2.6.6
linux linux_kernel 2.6.7
linux linux_kernel 2.6.7
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.8
linux linux_kernel 2.6.9
linux linux_kernel 2.6_test9_cvs
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
                     matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
                     matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
                     matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
                     matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
                     matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
                     matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
                     matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
                     matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
                     matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
                     matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
                     matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
                     matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
                     matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
                     matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
                     matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
                     matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
                     matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
                     matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
                     matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
                     matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
                     matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.",
      },
      {
         lang: "es",
         value: "La función scm_send de la capa scm de los kernel de Linux 2.4.x hasta 2.4.28 y 2.6.x hasta 2.6.9 permite a usuarios locales causar una denegación de servicio (cuelgue del sistema) mediante mensajes auxiliares artesanales que son pasados a la función sendmsg, lo que produce una condición de bloqueo mutuo.",
      },
   ],
   id: "CVE-2004-1016",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-689.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11921",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-38-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20162",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20202",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1069",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1070",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-1082",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-689.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-016.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2005-017.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11921",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-38-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2010-08-10 12:23
Modified
2025-04-11 00:51
Severity ?
Summary
The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.
Impacted products
Vendor Product Version
ubuntu ubuntu_linux 9.10
ubuntu ubuntu_linux 10.04
dell latitude_2110_netbook *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "27C9BF8A-AD42-401F-A8CA-486B6DCD47BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                     matchCriteriaId: "3976D70F-3D30-4EFF-9777-C687B293606B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:dell:latitude_2110_netbook:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30DE3567-65F0-431D-B12A-B2764BA313FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.",
      },
      {
         lang: "es",
         value: "El paquete base-files anterior a v5.0.0ubuntu7.1 en Ubuntu v9.10 y anterior a v5.0.0ubuntu20.10.04.2 en Ubuntu v10.04 LTS, como los incluidos en portátiles Dell Latitude 2110, no necesitan autenticación para la instalación de paquetes, lo que permite a atacantes con servidores de archivos remotos y \"man-in-the-middle\" (intermediario)  ejecutar código de su elección a través de paquetes manipulados.",
      },
   ],
   id: "CVE-2010-0834",
   lastModified: "2025-04-11T00:51:21.963",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2010-08-10T12:23:05.850",
   references: [
      {
         source: "security@ubuntu.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/40889",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/42280",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.ubuntu.com/usn/usn-968-1",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2010/2015",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/40889",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/42280",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-968-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2010/2015",
      },
   ],
   sourceIdentifier: "security@ubuntu.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.
References
cve@mitre.orghttp://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143
cve@mitre.orghttp://asg.web.cmu.edu/cyrus/download/imapd/changes.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110123023521619&w=2
cve@mitre.orghttp://secunia.com/advisories/13274/
cve@mitre.orghttp://security.e-matters.de/advisories/152004.html
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200411-34.xml
cve@mitre.orghttp://www.debian.org/security/2004/dsa-597
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:139
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18199
cve@mitre.orghttps://www.ubuntu.com/usn/usn-31-1/
af854a3a-2127-422b-91ae-364da2661108http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143
af854a3a-2127-422b-91ae-364da2661108http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110123023521619&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13274/
af854a3a-2127-422b-91ae-364da2661108http://security.e-matters.de/advisories/152004.html
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200411-34.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-597
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:139
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18199
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-31-1/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
                     matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command (\"body[p\") that is treated as a different command (\"body.peek\") and causes an index increment error that leads to an out-of-bounds memory corruption.",
      },
      {
         lang: "es",
         value: "El procesador de argumentos de la orden PARTIAL de Cyrus IMAP Server 2.2.6 y anteriores permite a usuarios remotos autentificados ejecutar código de su elección mediante una cierta orden (\"body[p\") que es tratada como una orden distinta (\"body.peek\") y produce un error de incremento de índice que conduce a una corrupción de memoria fuera de límites.",
      },
   ],
   id: "CVE-2004-1012",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-01-10T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
      },
      {
         source: "cve@mitre.org",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/13274/",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.e-matters.de/advisories/152004.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2004/dsa-597",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-31-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/13274/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.e-matters.de/advisories/152004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200411-34.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2004/dsa-597",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-31-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109880813013482&w=2
cve@mitre.orghttp://secunia.com/advisories/13000
cve@mitre.orghttp://securitytracker.com/id?1011941
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/p-029.shtml
cve@mitre.orghttp://www.debian.org/security/2004/dsa-582
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200411-05.xml
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_01_sr.html
cve@mitre.orghttp://www.osvdb.org/11179
cve@mitre.orghttp://www.osvdb.org/11180
cve@mitre.orghttp://www.osvdb.org/11324
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-615.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-650.html
cve@mitre.orghttp://www.securityfocus.com/bid/11526Exploit, Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17870
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17872
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17875
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17876
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173
cve@mitre.orghttps://www.ubuntu.com/usn/usn-89-1/
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109880813013482&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13000
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1011941
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/p-029.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-582
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_01_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/11179
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/11180
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/11324
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-615.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-650.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11526Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17870
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17872
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17875
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17876
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/usn-89-1/



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7C0B552-67E9-48E5-ABFB-AF0CD6DA46FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F8E361-E6D3-4666-B18D-928D550FD5D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB8BEC58-AB2A-4953-A2E8-338EB894A494",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABDE6C9A-4F24-42B4-8AA3-3EBC97190322",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "44FB2813-BE9F-46A8-864B-435D883CA0FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9DF1336-F831-4507-B45E-574BDE8AA8BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "33268B2F-3591-48D9-B123-92E3ABF157F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "0830367A-9FB3-4291-88C0-38A471DFD22B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "73E4EB1B-2E8B-4504-AB05-F4D4E6B038E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5815E25-5305-4A32-81B3-89DB1D5C1AC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlstarlet:command_line_xml_toolkit:0.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CF12410-9F1E-452C-BAA6-22E73A9FA75C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                     matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                     matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.",
      },
   ],
   id: "CVE-2004-0989",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-03-01T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890",
      },
      {
         source: "cve@mitre.org",
         url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/13000",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1011941",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ciac.org/ciac/bulletins/p-029.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2004/dsa-582",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/11179",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/11180",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/11324",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-615.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2004-650.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11526",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.ubuntu.com/usn/usn-89-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/13000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1011941",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ciac.org/ciac/bulletins/p-029.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2004/dsa-582",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/11179",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/11180",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/11324",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-615.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2004-650.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/11526",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.ubuntu.com/usn/usn-89-1/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}