fkie_cve-2010-0624
Vulnerability from fkie_nvd
Published
2010-03-15 13:28
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
References
cve@mitre.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
cve@mitre.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-March/036668.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-March/037395.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-March/037401.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-March/038134.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-March/038149.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
cve@mitre.orghttp://osvdb.org/62950
cve@mitre.orghttp://secunia.com/advisories/38869
cve@mitre.orghttp://secunia.com/advisories/38988
cve@mitre.orghttp://secunia.com/advisories/39008
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-201111-11.xml
cve@mitre.orghttp://www.agrs.tu-berlin.de/index.php?id=78327Exploit
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:065
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0141.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0142.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0144.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2010-0145.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/514503/100/0/threaded
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2456-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/0628
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/0629
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/0639
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/0687
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/0728
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/0729
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/1107
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=564368Patch
cve@mitre.orghttps://issues.rpath.com/browse/RPL-3219
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10277
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6907
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036668.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037395.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037401.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038134.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038149.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/62950
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38869
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38988
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39008
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201111-11.xml
af854a3a-2127-422b-91ae-364da2661108http://www.agrs.tu-berlin.de/index.php?id=78327Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:065
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0141.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0142.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0144.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0145.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/514503/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2456-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0628
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0629
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0639
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0687
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0728
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0729
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1107
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=564368Patch
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-3219
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10277
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6907
Impacted products
Vendor Product Version
gnu cpio *
gnu cpio 1.0
gnu cpio 1.1
gnu cpio 1.2
gnu cpio 1.3
gnu cpio 2.4-2
gnu cpio 2.5
gnu cpio 2.5.90
gnu cpio 2.6
gnu cpio 2.7
gnu cpio 2.8
gnu cpio 2.9
gnu tar *
gnu tar 1.13
gnu tar 1.13.5
gnu tar 1.13.11
gnu tar 1.13.14
gnu tar 1.13.16
gnu tar 1.13.17
gnu tar 1.13.18
gnu tar 1.13.19
gnu tar 1.13.25
gnu tar 1.14
gnu tar 1.14.1
gnu tar 1.14.90
gnu tar 1.15
gnu tar 1.15.1
gnu tar 1.15.90
gnu tar 1.15.91
gnu tar 1.16
gnu tar 1.16.1
gnu tar 1.17
gnu tar 1.18
gnu tar 1.19
gnu tar 1.20
gnu tar 1.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B3F7BC-95D3-457F-B56B-26699C97EA05",
              "versionEndIncluding": "2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B592FE1-4388-4A5C-876D-AAC89E91DF24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB75D50B-5522-45F4-868A-B4670613D899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "372BEB33-43CC-48D0-A8AA-81393C91FECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F755D6ED-BAD5-40BE-94B4-EE2D32375248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:2.4-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D29C5F9-0EF2-4542-8AC5-A65E0E449F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F75CAA-60E1-4538-9B32-ECCC6E2A10C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:2.5.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5ED3F5E-BD5C-43E1-B3BE-9C58D55D1F12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "543B8FA8-EFAF-419A-A582-81C8A7F31D36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "47FB6FCC-DA56-48C4-A7FB-813357E8C009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2049F73D-0C4E-4EE5-8FDB-8B7F2927128B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:cpio:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2693D605-B4EF-4F92-B542-A01161856318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACAC88-58E6-4234-8795-7B7CF9D89054",
              "versionEndIncluding": "1.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1FA7050-9C48-490C-974E-BBED58A70E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BCC81C4-718C-4D1C-9C0B-A49B6986D9EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "504BA480-EF7F-4604-A9D4-50C6C8576D1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2095CF90-0433-4F9A-A5F5-74A5C401E703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "322AD74F-6976-4261-9609-5678293B1FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "471DDE51-BE1B-48D1-AC07-D8CE971F0F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FAAF649-BE68-47E2-BD25-EF9DF9B26655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "F94C4466-E3D2-4275-86A8-5D180F493B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "60CD7558-833D-473B-99A4-854FB6CC6C9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87C1F89-63A8-4955-9C42-3B49EC1C1C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4A8A88-D915-455C-A226-A8AD8A9E887E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.14.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3F6678-D645-4614-8C57-2833BE8BE77E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE339D0-D585-440D-8BD4-5183833258F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8B4A20D-AAD0-4857-AC0F-D221EBB08BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B46F22-B0FB-4F99-B44E-D34E0DD5D194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.15.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D8F228C-6DED-42A2-BE9B-944171EAC10C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B6D83BA-6C85-43F3-87FD-A77CC6F1D21A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "205C3978-7317-48BB-ADC6-C226CCA2D379",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BF78BD-B860-47A4-90E9-D6CD7A6FC5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "18BBBFFE-5A92-48C6-9DFB-7EC410FA0742",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0619D33-E655-49E7-9D6A-5A447D71D0CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5940AA70-909E-4322-8441-ED5F87086348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:tar:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC10F9D6-03C2-4B0D-B50A-A016A8E1AFA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n rmt_read__ en lib/rtapelib.c en la funcionalidad de cliente rmt en GNU tar anterior v1.23 y GNU cpio anterior v2.11 permite a servidores rmt remotos causar una denegaci\u00f3n de servicio (ca\u00edda de memoria) o probablemente ejecutar c\u00f3digo de su elecci\u00f3n con el env\u00edo de m\u00e1s datos de los requeridos, relacionado con nombre de ficheros que contienen el caracter : (dos puntos)."
    }
  ],
  "id": "CVE-2010-0624",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-03-15T13:28:25.777",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10691"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036668.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037395.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037401.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038134.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038149.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/62950"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/38869"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/38988"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/39008"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201111-11.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.agrs.tu-berlin.de/index.php?id=78327"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:065"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0141.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0142.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0144.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0145.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/514503/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-2456-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0628"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0629"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0639"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0687"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0728"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0729"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=564368"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-3219"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10277"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6907"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036668.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037395.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037401.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038134.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038149.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/62950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38988"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201111-11.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.agrs.tu-berlin.de/index.php?id=78327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0141.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0142.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0144.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0145.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/514503/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2456-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0628"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0639"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0728"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=564368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-3219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6907"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…