Vulnerabilites related to httrack - winhttrack
CVE-2008-3429 (GCVE-0-2008-3429)
Vulnerability from cvelistv5
Published
2008-07-31 22:00
Modified
2024-08-07 09:37
Severity ?
CWE
  • n/a
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:37:26.948Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "httrack-urls-bo(44167)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.httrack.com/history.txt"
          },
          {
            "name": "ADV-2008-2221",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2221/references"
          },
          {
            "name": "DSA-1626",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1626"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
          },
          {
            "name": "31323",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31323/"
          },
          {
            "name": "30425",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30425"
          },
          {
            "name": "FEDORA-2008-7896",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
          },
          {
            "name": "FEDORA-2008-7862",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
          },
          {
            "name": "31866",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31866"
          },
          {
            "name": "31380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31380"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-07-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "httrack-urls-bo(44167)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.httrack.com/history.txt"
        },
        {
          "name": "ADV-2008-2221",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2221/references"
        },
        {
          "name": "DSA-1626",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1626"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
        },
        {
          "name": "31323",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31323/"
        },
        {
          "name": "30425",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30425"
        },
        {
          "name": "FEDORA-2008-7896",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
        },
        {
          "name": "FEDORA-2008-7862",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
        },
        {
          "name": "31866",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31866"
        },
        {
          "name": "31380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31380"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3429",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "httrack-urls-bo(44167)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
            },
            {
              "name": "http://www.httrack.com/history.txt",
              "refsource": "CONFIRM",
              "url": "http://www.httrack.com/history.txt"
            },
            {
              "name": "ADV-2008-2221",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2221/references"
            },
            {
              "name": "DSA-1626",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1626"
            },
            {
              "name": "http://www.venustech.com.cn/NewsInfo/124/2032.Html",
              "refsource": "MISC",
              "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
            },
            {
              "name": "31323",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31323/"
            },
            {
              "name": "30425",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30425"
            },
            {
              "name": "FEDORA-2008-7896",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
            },
            {
              "name": "FEDORA-2008-7862",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
            },
            {
              "name": "31866",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31866"
            },
            {
              "name": "31380",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31380"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3429",
    "datePublished": "2008-07-31T22:00:00",
    "dateReserved": "2008-07-31T00:00:00",
    "dateUpdated": "2024-08-07T09:37:26.948Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2008-07-31 22:41
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
References
cve@mitre.orghttp://secunia.com/advisories/31323/
cve@mitre.orghttp://secunia.com/advisories/31380
cve@mitre.orghttp://secunia.com/advisories/31866
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1626
cve@mitre.orghttp://www.httrack.com/history.txt
cve@mitre.orghttp://www.securityfocus.com/bid/30425
cve@mitre.orghttp://www.venustech.com.cn/NewsInfo/124/2032.Html
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2221/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44167
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31323/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31380
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31866
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1626
af854a3a-2127-422b-91ae-364da2661108http://www.httrack.com/history.txt
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30425
af854a3a-2127-422b-91ae-364da2661108http://www.venustech.com.cn/NewsInfo/124/2032.Html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2221/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44167
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html
Impacted products
Vendor Product Version
httrack httrack 0.23
httrack httrack 0.24
httrack httrack 0.25
httrack httrack 0.99
httrack httrack 0.996
httrack httrack 0.997
httrack httrack 0.998
httrack httrack 1.00
httrack httrack 1.01
httrack httrack 1.02
httrack httrack 1.03
httrack httrack 1.04
httrack httrack 1.10
httrack httrack 1.10
httrack httrack 1.10
httrack httrack 1.10
httrack httrack 1.10
httrack httrack 1.11
httrack httrack 1.15
httrack httrack 1.15
httrack httrack 1.16
httrack httrack 1.16
httrack httrack 1.20
httrack httrack 1.21
httrack httrack 1.22
httrack httrack 1.23
httrack httrack 1.24
httrack httrack 1.30
httrack httrack 2.00
httrack httrack 2.01
httrack httrack 2.2
httrack httrack 2.02
httrack httrack 3.00
httrack httrack 3.01
httrack httrack 3.02
httrack httrack 3.03
httrack httrack 3.04
httrack httrack 3.05
httrack httrack 3.06
httrack httrack 3.07
httrack httrack 3.08
httrack httrack 3.09
httrack httrack 3.10
httrack httrack 3.15
httrack httrack 3.16
httrack httrack 3.20
httrack httrack 3.21
httrack httrack 3.22
httrack httrack 3.23
httrack httrack 3.30
httrack httrack 3.31
httrack httrack 3.32
httrack httrack 3.33
httrack httrack 3.40
httrack httrack 3.40
httrack httrack 3.41
httrack httrack 3.41
httrack httrack 3.41
httrack httrack 3.42
httrack httrack 3.42
httrack httrack 3.42
httrack winhttrack *
httrack winhttrack 0.23
httrack winhttrack 0.24
httrack winhttrack 0.25
httrack winhttrack 0.99
httrack winhttrack 0.996
httrack winhttrack 0.997
httrack winhttrack 0.998
httrack winhttrack 1.00
httrack winhttrack 1.01
httrack winhttrack 1.02
httrack winhttrack 1.03
httrack winhttrack 1.04
httrack winhttrack 1.10
httrack winhttrack 1.10
httrack winhttrack 1.10
httrack winhttrack 1.10
httrack winhttrack 1.10
httrack winhttrack 1.11
httrack winhttrack 1.15
httrack winhttrack 1.16
httrack winhttrack 1.16
httrack winhttrack 1.20
httrack winhttrack 1.21
httrack winhttrack 1.22
httrack winhttrack 1.23
httrack winhttrack 1.24
httrack winhttrack 1.30
httrack winhttrack 2.00
httrack winhttrack 2.01
httrack winhttrack 2.02
httrack winhttrack 2.2
httrack winhttrack 3.00
httrack winhttrack 3.01
httrack winhttrack 3.02
httrack winhttrack 3.03
httrack winhttrack 3.04
httrack winhttrack 3.05
httrack winhttrack 3.06
httrack winhttrack 3.07
httrack winhttrack 3.08
httrack winhttrack 3.09
httrack winhttrack 3.10
httrack winhttrack 3.15
httrack winhttrack 3.15
httrack winhttrack 3.16
httrack winhttrack 3.20
httrack winhttrack 3.21
httrack winhttrack 3.22
httrack winhttrack 3.23
httrack winhttrack 3.30
httrack winhttrack 3.31
httrack winhttrack 3.32
httrack winhttrack 3.33
httrack winhttrack 3.40
httrack winhttrack 3.40
httrack winhttrack 3.41
httrack winhttrack 3.41
httrack winhttrack 3.41
httrack winhttrack 3.42



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.23:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "30A61DED-D601-4FCD-82A8-9AA0F6660D06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.24:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "CA9DC545-4B39-4135-8F42-3A2A4C25D5F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.25:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "5B492CFE-25C8-466D-848C-F0E606677882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.99:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "E3666C84-2626-453B-80AA-3712CEDFC40F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.996:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "31CAA471-A9D5-44A2-96A4-03E54B1307D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.997:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "C18F4201-8FDD-45E3-891C-BEABC91B5132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:0.998:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "8EAC0EC7-9FFE-4F57-B9EC-E8744C8C1876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "55CE92DE-889F-4219-A20B-1658FD1A20D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FDCAC6-5142-4730-B823-E2F2AC002C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "69198DB6-723E-45F0-BDD8-D6106EA432EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD90479B-84F3-45A7-AA68-FA0B6A5D14C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "97354343-B565-4CC1-B2EF-883F7AE2A81F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B4BAAF0-714D-4FD6-9FEE-F68391E07CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:b:*:*:*:*:*:*",
              "matchCriteriaId": "90C3786A-6F46-40A9-B51C-4D2D153B8760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:c:*:*:*:*:*:*",
              "matchCriteriaId": "93863B08-5B94-4952-A1FA-0E7CA7544C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:d:*:*:*:*:*:*",
              "matchCriteriaId": "5BC576E1-A95F-4B2B-ADE7-F52CB25F647E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.10:e:*:*:*:*:*:*",
              "matchCriteriaId": "3F0289D6-58C3-40C6-87AB-FEBF45AF327B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E53081E7-F8D1-458A-AD2C-2E1AA79B7B7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FADF089-961C-469C-A333-353B1CD308FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.15:b:*:*:*:*:*:*",
              "matchCriteriaId": "EBEE9FDE-FC46-43A8-8253-954B61B88A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF625B94-9204-4CDF-93BA-AC785087DA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.16:b:*:*:*:*:*:*",
              "matchCriteriaId": "161231F6-F21F-4D2F-AE63-B321EC8E0578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB14522C-7783-4A9A-8A0E-B8D5D39049CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "08487F25-62EE-4873-A641-E3C6012C3FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB814FD0-A59F-4D95-B595-18A034747385",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F142B1-2646-4725-B926-44F2734C06A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EE56720-C089-45EA-8173-2BC3B9BCEE51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A59CE6D-77AC-4111-A106-09F68F14EE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:2.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22047DC8-7DA0-4DB9-B806-60901262F49E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "18447927-A5B0-44A3-B346-C24F8A456945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E218C652-ABB0-4445-8FF7-28CC59DD311D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E4CD38B-9F65-4A79-A44A-9B5C002125AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E741EEE4-0ED4-4AF1-A7C3-D978B32194D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4B90D7C-E458-4C24-A0E7-494DA3837948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B488E1-EF0D-4A0E-9E26-12742EFE54E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "5760D8D4-9879-462A-ADBD-8D3DEEDF87E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BDC99D-71E2-474F-BE92-CC2560B10BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "61DB5944-DADF-47BF-9064-DAFCB2DE6F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F25BDEC-93ED-47D6-829D-7E6CB9EF563C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "4763A337-1E82-45CF-AF95-4B189EF47354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FAF9C77-2D09-49AE-8301-5A96064EEFAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B428DE-8023-449B-8619-41044F82A5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A79F6982-3519-495E-A7A0-B3096F3D8C30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF5CB5E-8768-412C-9B41-A870F2BDEDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.16:2:*:*:*:*:*:*",
              "matchCriteriaId": "5E11ADCD-CA49-4AA9-BF64-ACA01FF85936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.20:2:*:*:*:*:*:*",
              "matchCriteriaId": "BEDB7060-F385-49B7-B547-F4670F5971F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.21:8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1176AC-D41F-4A94-84C4-3F5FD1D9772B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.22:3:*:*:*:*:*:*",
              "matchCriteriaId": "2C5B81B7-0F69-4577-8DFD-623C783B93B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE90318-8B47-4AB6-9EF0-59A03AEC3EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE97BF0A-4B4D-494C-A997-36E7449E1FE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ACD1DA3-AA16-4127-AC1B-157BE695B8B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D175651-5CD6-4477-8496-55C4E963BF27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8ACAA7A-7D8A-44F4-987F-E71C284B84F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7BFB002-F9A0-46A7-BDC2-E1BFB54B5342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.40:2:*:*:*:*:*:*",
              "matchCriteriaId": "B09BE206-FEDA-46ED-9027-0E3D6DEF33F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEEAA51F-5405-457E-912D-04A750C61C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.41:2:*:*:*:*:*:*",
              "matchCriteriaId": "96470815-113A-4874-B3C2-B1BD42E5D61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.41:3:*:*:*:*:*:*",
              "matchCriteriaId": "016617B2-E181-4732-9F6D-107679371624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "0865F74D-87A9-429A-BEF7-02E145DB4698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.42:2:*:*:*:*:*:*",
              "matchCriteriaId": "3D350B62-3894-4708-AB36-A53C95B529E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:httrack:3.42:3:*:*:*:*:*:*",
              "matchCriteriaId": "E44DE8C5-FD50-410C-B3BA-3C4A4CA05173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:*:2:*:*:*:*:*:*",
              "matchCriteriaId": "D198D5DD-FCA6-4146-A128-6B08B60668F6",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.23:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "4F24FD93-7F69-4AD2-A3C0-4A58E2427204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.24:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "C66E9B9A-7752-4ACB-8E70-15C5A5CF9FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.25:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "5C50FA58-D0E8-4EF4-993B-BFFFBCD31A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.99:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "9AA15A17-3D5B-431F-85F7-719D16C51C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.996:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "23668163-813E-4A0A-8F5A-AFF8B72E641F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.997:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "946CF2C4-AC27-4D6E-84CA-119BBDC586F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:0.998:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "4B210EC5-5CE5-4C29-996C-0EB1145A359F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CB654C-5A0A-4AD2-A7E4-E5FBD41AD111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4F9850-1F0F-44E9-913A-97EB742E8510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA284FCF-8AC4-4218-8115-FB41366F81DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6420DCD-72DE-4597-B961-DB06972F6A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F3C4AE-3824-4130-A84C-8358A7D621DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDB91A73-0E5A-4592-81F3-62A8A578DC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:b:*:*:*:*:*:*",
              "matchCriteriaId": "D3DE24C3-34D2-409A-BD35-5D1A1C8C285E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:c:*:*:*:*:*:*",
              "matchCriteriaId": "4EFCAE76-7B19-4DF6-8700-24A2F36FBC30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:d:*:*:*:*:*:*",
              "matchCriteriaId": "821397D4-2184-45B6-A5E0-0518081E1B80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.10:e:*:*:*:*:*:*",
              "matchCriteriaId": "FD774253-68B9-450B-9C5F-802034C84A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7282DC66-01CD-49F6-9FAD-70C8EA443687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D6AA4B8-BE17-4DDD-8F7A-55543EE5306C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CFFF64-2974-4510-8B44-6C8C4752E31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.16:b:*:*:*:*:*:*",
              "matchCriteriaId": "6F3FA036-18A8-40DC-B8E4-7EC2977032FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE067177-2009-445E-A730-54575F8BA6D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "478DFB57-B1C8-4282-8526-5127DEE18EE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7E08DB9-A53D-41E5-A3BB-442BB68B6ADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC5E2B53-73BC-4648-8F63-79631F1F1790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE21A00-F336-46E1-9521-B3BF57EBD291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD92B8F5-F37F-4FF4-8BD6-7921976CF014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:2.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BB4DCA-7F63-4AFF-9EFE-765CC88EAB70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C2DFB0-8BD4-40F0-892A-BB03B2B79836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AC39F4-3466-4B3B-80C1-C01A72F144A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA18C300-3602-4734-93BB-D8A32D01F34B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A398DC-CDCF-4727-8983-07E343B9D1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3F0900-1592-45EE-BC34-68945653EAD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EA680DA-A9DD-4B01-A036-CCD2C2752D6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91198C2-64AD-420D-B527-CD98209FC1D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A7DE353-7A3F-4BEF-AD85-4710BEC1B322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "150EDF01-496C-4BEB-97FF-FE8FD424A399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "F44A791C-B9C3-4298-9C7B-1AEEE28688AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CB13FD-9E4B-4816-B246-0E26B62378E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E3F8937-6978-4DCD-ADAD-F95B235944CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "431E48C8-A9A1-4B3F-B1D0-D658CB44C1F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BE5DB7-077A-4B91-9184-A81032B08692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EC15A35-E68D-46DF-BAC7-3AB39CDE0D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.15:b:*:*:*:*:*:*",
              "matchCriteriaId": "312C47AB-4AD2-4600-B0BD-7C34524F1522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.16:2:*:*:*:*:*:*",
              "matchCriteriaId": "616DB4E3-C1FB-4DFC-9F98-4510A468EC21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.20:2:*:*:*:*:*:*",
              "matchCriteriaId": "EA77BC82-49AF-4797-AF8A-BABD0671F31D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.21:8:*:*:*:*:*:*",
              "matchCriteriaId": "60D8BD06-43BF-496B-9A0F-5FF66BA0D3F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.22:3:*:*:*:*:*:*",
              "matchCriteriaId": "B876EC8A-9A8D-42AB-B4F3-E9ECF3375831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE2E7FB6-4A9E-431E-9504-6C8EC86A6B62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "219939CD-3530-4CC5-8C2E-69162E692FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B23265-E4C3-415C-A083-61891EE3860E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A821F7-256E-4749-9294-A2627D40DB09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "4196933D-B459-4AC9-A5A1-E6E8CC410572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "53472D88-F355-48A3-BE7E-596EFC0F3727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.40:2:*:*:*:*:*:*",
              "matchCriteriaId": "F7A1751D-5C49-4996-8D5F-496774A8EA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BAF3263-D5F8-40F9-9A9C-2721225BC14B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:2:*:*:*:*:*:*",
              "matchCriteriaId": "722AB21A-96C6-4FD7-9297-F62B933D4203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.41:3:*:*:*:*:*:*",
              "matchCriteriaId": "CA434245-AC94-4A81-BF70-E359CB57265A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:httrack:winhttrack:3.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "91E5F413-6040-4BF7-88AB-E08C7FCFCCFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de Buffer en el procesado de URI de HTTrack y WinHTTrack versiones anteriores a la 3.42-3, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrariamente mediante una URL larga."
    }
  ],
  "id": "CVE-2008-3429",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-07-31T22:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31323/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31380"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31866"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1626"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.httrack.com/history.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30425"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2221/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31323/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31866"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.httrack.com/history.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30425"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.venustech.com.cn/NewsInfo/124/2032.Html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2221/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00707.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00711.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}