fkie_cve-2009-0263
Vulnerability from fkie_nvd
Published
2009-01-23 19:00
Modified
2024-11-21 00:59
Severity ?
Summary
Multiple buffer overflows in Winamp 5.541 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a large Common Chunk (COMM) header value in an AIFF file and (2) a large invalid value in an MP3 file.
Impacted products
Vendor Product Version
nullsoft winamp *
nullsoft winamp 2.0
nullsoft winamp 2.4
nullsoft winamp 2.5e
nullsoft winamp 2.6x
nullsoft winamp 2.7x
nullsoft winamp 2.10
nullsoft winamp 2.24
nullsoft winamp 2.50
nullsoft winamp 2.60
nullsoft winamp 2.60
nullsoft winamp 2.60
nullsoft winamp 2.61
nullsoft winamp 2.61
nullsoft winamp 2.62
nullsoft winamp 2.62
nullsoft winamp 2.64
nullsoft winamp 2.64
nullsoft winamp 2.65
nullsoft winamp 2.70
nullsoft winamp 2.70
nullsoft winamp 2.71
nullsoft winamp 2.72
nullsoft winamp 2.73
nullsoft winamp 2.73
nullsoft winamp 2.74
nullsoft winamp 2.75
nullsoft winamp 2.76
nullsoft winamp 2.77
nullsoft winamp 2.78
nullsoft winamp 2.79
nullsoft winamp 2.80
nullsoft winamp 2.81
nullsoft winamp 2.90
nullsoft winamp 2.91
nullsoft winamp 2.95
nullsoft winamp 3.0
nullsoft winamp 3.1
nullsoft winamp 5.0
nullsoft winamp 5.0.1
nullsoft winamp 5.0.2
nullsoft winamp 5.01
nullsoft winamp 5.1
nullsoft winamp 5.02
nullsoft winamp 5.2
nullsoft winamp 5.3
nullsoft winamp 5.03
nullsoft winamp 5.03a
nullsoft winamp 5.04
nullsoft winamp 5.05
nullsoft winamp 5.5
nullsoft winamp 5.06
nullsoft winamp 5.07
nullsoft winamp 5.08
nullsoft winamp 5.08
nullsoft winamp 5.08
nullsoft winamp 5.08
nullsoft winamp 5.08c
nullsoft winamp 5.08d
nullsoft winamp 5.08e
nullsoft winamp 5.09
nullsoft winamp 5.11
nullsoft winamp 5.12
nullsoft winamp 5.13
nullsoft winamp 5.21
nullsoft winamp 5.22
nullsoft winamp 5.23
nullsoft winamp 5.24
nullsoft winamp 5.31
nullsoft winamp 5.32
nullsoft winamp 5.33
nullsoft winamp 5.34
nullsoft winamp 5.35
nullsoft winamp 5.36
nullsoft winamp 5.51
nullsoft winamp 5.52
nullsoft winamp 5.53
nullsoft winamp 5.54
nullsoft winamp 5.091
nullsoft winamp 5.093
nullsoft winamp 5.094
nullsoft winamp 5.111
nullsoft winamp 5.112



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9872304B-8AEB-4EF5-A0C8-73722CEE0368",
              "versionEndIncluding": "5.541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAFFD8E7-A443-4131-9CFB-67AA9739E6E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2787A5F-5B74-4691-A2AD-BA5038D14784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5217B6-B543-4F2C-89DF-CE986AE0BADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.6x:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E3DB21-0E4F-409E-A60B-CBFFD71BBB1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.7x:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F7F13A-D45B-4AA9-9CD3-D4E285791E37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0581F9-9B99-43F6-852E-BD28BB47B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "95EA0F31-8818-434C-9965-78764D00F148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C999742-75BD-463F-865F-93662B17330F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDFC131-873D-4564-B342-569DF45F31F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.60:*:full:*:*:*:*:*",
              "matchCriteriaId": "30C29FDB-A37E-4126-BE1B-DB32F38DC75F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.60:*:lite:*:*:*:*:*",
              "matchCriteriaId": "E7254BFD-8301-4E99-AB73-7D1D9E7939FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DEBD661-3253-47CC-91D9-B8F8E1211014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.61:*:full:*:*:*:*:*",
              "matchCriteriaId": "27826A30-3E5C-4B7D-B86B-8B0A68D2F944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45D7DD1-AFF9-441D-ABF1-A62FA0A9E05B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.62:*:standard:*:*:*:*:*",
              "matchCriteriaId": "665C2A54-AF79-4315-BFEF-FA44E015B9C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AE4866-33D1-4596-BA42-E70ABD0CDC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.64:*:standard:*:*:*:*:*",
              "matchCriteriaId": "0DB02A8B-71ED-4FBF-9D01-D16F1351E702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D708182-E39F-44E4-9C67-52A85ACBA43C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "053A71B1-EF83-4750-ACCD-7ABEFF593BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.70:*:full:*:*:*:*:*",
              "matchCriteriaId": "F07CC71D-A616-483B-ABCB-AA6DDCE3531F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5286A1-C8ED-4783-9278-D30D9B1C588A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "3513F3C2-CDD6-461C-985E-E06151AEA804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6CB5C4-0FEC-4F85-B874-E06229265457",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.73:*:full:*:*:*:*:*",
              "matchCriteriaId": "C700DFBF-9B22-4633-947C-840CF01423C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD6E478F-D058-482B-B027-605B7A769900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9D8698A-B1AE-4041-9055-B6690F671E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2CC66AF-0CB8-4E15-98A3-4704CB2AD78E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E36F70C-F578-425E-A97F-1BD196F7F08B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDAD5F1-5B42-40ED-919C-65343567261C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAC79237-791C-4830-BC81-D534FA537D53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1AFA764-16B4-4E5E-8F9C-46098E758CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "14F260E7-5145-4FDC-9759-67EA27CEFC5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AD15C7B-64FF-42CF-ABD7-8973DDE89FC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CEA7967-D737-4B46-9382-A391DF832219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "830610D8-1B42-4560-ABB4-BA79DD145110",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF89B4A2-37A6-4702-A057-7B70C6157A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "19C64AF2-CF9D-4052-85E9-BAFF713382F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EFF2D1-D88F-436F-8E82-EAE681DE7AA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F898DA-A260-4A81-8E94-DE85154B88DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4510C850-49A0-4082-81CF-333829FE8639",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "828226F9-29AA-437F-8385-B75A6F4F3B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D8A3244-F6FF-4865-BCAD-EAF784AE93DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAD7DE0D-1018-4E04-A771-B2C619E95C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "798885D9-B518-4C10-81B9-32AEB512C14D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5EF1ED-9AA1-41D0-8781-619F8F50F4FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D38D15-3588-49E4-9396-11DB96FBD448",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.03a:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEF39A44-528E-4BE8-A923-FFB53C2378F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED120987-6F27-4D8E-95DF-E19EBCB0B8D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF40252-7E87-4EE6-B2C7-19E8D78C4025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E02CCF2-2335-4F08-8061-6CFD7C8B265A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48A746C-1020-4A9C-A9D4-94B6FFFA1FDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF272FF7-68ED-4D8B-9C17-D9D46AA33335",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8C02C8-508A-4A6C-8911-12FB9B183C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.08:c:*:*:*:*:*:*",
              "matchCriteriaId": "5785692F-D8FA-4D49-8872-CB8B2F173557",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.08:d:*:*:*:*:*:*",
              "matchCriteriaId": "A6E85C52-1974-4F83-89AE-BB29FC897E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.08:e:*:*:*:*:*:*",
              "matchCriteriaId": "CB082F8B-A052-4D82-9D73-2BB35FBA19F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8FAD29A-6A61-4201-A0E6-1F04BF093600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EE09C3-B49C-4D7D-BCD1-2AA2104A271A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E4497A5-6E95-4CB3-999E-53BF890A23F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "057B033C-7836-41E0-B184-F9D5DFC42C86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "20168350-2AD1-4AF4-B0AA-4C2EBF616259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39A6931-A3CD-44A7-B170-53B803F321AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A651DB07-0A59-41C5-8788-6A3594A5023C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "199953E2-C5A4-4D7B-9BB4-EF0B1364F117",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE765893-71E4-4945-891C-976B97762CC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF245AA-7038-4BD4-B2CB-8B0E59200875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DEF8714-56FC-4D6C-AE87-072ADD7698A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "E808BCEF-FE45-44D3-B22B-404BC97B89C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA6E29C6-CDC9-4C0B-8D79-8A5A11B563CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14B9D39-BF74-4C69-92BF-DE6E71FDD911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD83F571-1A58-4159-AC2F-7261F135EF45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB054736-2F91-4EF3-B04F-80403676374F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "287E954F-6A04-442A-B93E-CDD2ABEB357E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEE5A4C-770A-458B-AC1A-8F1F99A0951A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58E9493-556E-4085-B337-AE211A28DA6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4F66E7-7F61-4F59-9213-21598A3DFD50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C6E95D5-D855-4CD4-B44B-66FF029EC823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C6A1F15-A3FA-40FB-980A-569F77E1D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*",
              "matchCriteriaId": "684ABC3F-57CB-490B-ADCB-501E0D234E16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BB30030-A195-4626-AAED-D421454D911D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB3FCB9-6CF4-4513-9FB9-D01C58079060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "913962D9-84AA-4474-800E-5DABF37D52A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in Winamp 5.541 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a large Common Chunk (COMM) header value in an AIFF file and (2) a large invalid value in an MP3 file."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en Winamp v5.541 y anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio y posiblemente ejecuci\u00f3n c\u00f3digo de su eledcci\u00f3n a trav\u00e9s de (1) un valor de cabecera Common Chunk (COMM) largo en un fichero AIFF y (2) un valor inv\u00e1lido largo en un fichero MP3."
    }
  ],
  "id": "CVE-2009-0263",
  "lastModified": "2024-11-21T00:59:28.613",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-01-23T19:00:05.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33478"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/33226"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/0113"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14756"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/7742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/33226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/0113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14756"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/7742"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.