Show plain JSON{"id": "CVE-2007-1528", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-03-20T20:19:00.000", "references": [{"url": "http://osvdb.org/33662", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/462793/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/23280", "source": "cve@mitre.org"}, {"url": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/33662", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/462793/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/23280", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The LLTD Mapper in Microsoft Windows Vista allows remote attackers to spoof hosts, and nonexistent bridge relationships, into the network topology map by using a MAC address that differs from the MAC address provided in the Real Source field of the LLTD BASE header of a HELLO packet, aka the \"Spoof on Bridge\" attack."}, {"lang": "es", "value": "El Mapeador LLTD de Microsoft Windows Vista permite a atacantes remotos suplantar anfitriones (hosts), relaciones de puente inexistentes, en el mapa de topolog\u00eda de red utilizando una direcci\u00f3n MAC distinta de la direcci\u00f3n MAC proporcionada en el campo Real Source de la cabecera LLTD BASE de un paquete HELLO, tambi\u00e9n conocido como ataque de \"Suplantaci\u00f3n de Puente\"."}], "lastModified": "2024-11-21T00:28:32.307", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}