Show plain JSON{"id": "CVE-2018-1000221", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2018-08-20T20:29:01.190", "references": [{"url": "https://git.dereferenced.org/pkgconf/pkgconf/pulls/3", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://git.dereferenced.org/pkgconf/pkgconf/pulls/3", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "pkgconf version 1.5.0 to 1.5.2 contains a Buffer Overflow vulnerability in dequote() that can result in dequote() function returns 1-byte allocation if initial length is 0, leading to buffer overflow. This attack appear to be exploitable via specially crafted .pc file. This vulnerability appears to have been fixed in 1.5.3."}, {"lang": "es", "value": "pkgconf desde la versi\u00f3n 1.5.0 hasta la 1.5.2 contiene una vulnerabilidad de desbordamiento de b\u00fafer en dequote() que puede resultar en en que la funci\u00f3ndequote() devuelva una asignaci\u00f3n de 1 byte si la longitud inicial es 0, provocando un desbordamiento de b\u00fafer. Este ataque parece ser explotable mediante un archivo .pc especialmente manipulado. La vulnerabilidad parece haber sido solucionada en la versi\u00f3n 1.5.3."}], "lastModified": "2024-11-21T03:39:57.867", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pkgconf:pkgconf:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08DB2F8B-F1A5-4B27-8347-8D8EF5741BFD", "versionEndIncluding": "1.5.2", "versionStartIncluding": "1.5.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}