Show plain JSON{"id": "CVE-2012-2944", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2012-06-01T20:55:08.857", "references": [{"url": "http://alioth.debian.org/tracker/?func=detail&aid=313636", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://networkupstools.org/docs/user-manual.chunked/apis01.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/49348", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/50389", "source": "cve@mitre.org"}, {"url": "http://trac.networkupstools.org/projects/nut/changeset/3633", "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2012/dsa-2484", "source": "cve@mitre.org"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:087", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/82409", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/53743", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75980", "source": "cve@mitre.org"}, {"url": "https://hermes.opensuse.org/messages/15514634", "source": "cve@mitre.org"}, {"url": "http://alioth.debian.org/tracker/?func=detail&aid=313636", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://networkupstools.org/docs/user-manual.chunked/apis01.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/49348", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/50389", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://trac.networkupstools.org/projects/nut/changeset/3633", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2012/dsa-2484", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:087", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/82409", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/53743", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75980", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://hermes.opensuse.org/messages/15514634", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n addchar en common/parseconf.c en upsd en Network UPS Tools (NUT), antes de v2.6.4 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corte de energ\u00eda el\u00e9ctrica) a trav\u00e9s de una larga cadena que contiene imprimibles no caracteres."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:networkupstools:nut:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA1A420A-4B10-4A39-9393-DF4399AF8A3A", "versionEndIncluding": "2.6.3-3"}, {"criteria": "cpe:2.3:a:networkupstools:nut:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E21A4CC6-DF4E-4C18-8DCD-3E316B694FAF"}, {"criteria": "cpe:2.3:a:networkupstools:nut:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "980911A5-084D-447B-9B2B-B7DA9C751074"}, {"criteria": "cpe:2.3:a:networkupstools:nut:2.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FBEC024-EC1C-4989-BA28-9C1AFC2922E6"}, {"criteria": "cpe:2.3:a:networkupstools:nut:2.6.0:pre1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A16A7093-48E1-401D-AE0F-78E10759C688"}, {"criteria": "cpe:2.3:a:networkupstools:nut:2.6.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87B240E6-56BE-481F-B0A3-4D57740D48AA"}, {"criteria": "cpe:2.3:a:networkupstools:nut:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A759BB33-3284-4C42-BEBB-B1C654864202"}, {"criteria": "cpe:2.3:a:networkupstools:nut:2.6.1-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95DE25D2-E68C-49C6-92A1-90B2155F1233"}, {"criteria": "cpe:2.3:a:networkupstools:nut:2.6.3-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77684429-DFDF-4423-A9B2-EF434AA6CFBB"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}