Advertisement
Guest User

Untitled

a guest
Jun 30th, 2014
410
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
XML 4.26 KB | None | 0 0
  1. <entry id="CVE-2014-0001">
  2.     <vuln:vulnerable-configuration id="http://www.nist.gov/">
  3.       <cpe-lang:logical-test negate="false" operator="OR">
  4.         <cpe-lang:fact-ref name="cpe:/a:oracle:mysql:-"/>
  5.         <cpe-lang:fact-ref name="cpe:/a:mariadb:mariadb:5.5.34"/>
  6.       </cpe-lang:logical-test>
  7.     </vuln:vulnerable-configuration>
  8.     <vuln:vulnerable-software-list>
  9.       <vuln:product>cpe:/a:mariadb:mariadb:5.5.34</vuln:product>
  10.       <vuln:product>cpe:/a:oracle:mysql:-</vuln:product>
  11.     </vuln:vulnerable-software-list>
  12.     <vuln:cve-id>CVE-2014-0001</vuln:cve-id>
  13.     <vuln:published-datetime>2014-01-31T18:55:04.503-05:00</vuln:published-datetime>
  14.     <vuln:last-modified-datetime>2014-05-05T01:31:23.107-04:00</vuln:last-modified-datetime>
  15.     <vuln:cvss>
  16.       <cvss:base_metrics>
  17.         <cvss:score>7.5</cvss:score>
  18.         <cvss:access-vector>NETWORK</cvss:access-vector>
  19.         <cvss:access-complexity>LOW</cvss:access-complexity>
  20.         <cvss:authentication>NONE</cvss:authentication>
  21.         <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
  22.         <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
  23.         <cvss:availability-impact>PARTIAL</cvss:availability-impact>
  24.         <cvss:source>http://nvd.nist.gov</cvss:source>
  25.         <cvss:generated-on-datetime>2014-02-03T11:10:48.857-05:00</cvss:generated-on-datetime>
  26.       </cvss:base_metrics>
  27.     </vuln:cvss>
  28.     <vuln:cwe id="CWE-119"/>
  29.     <vuln:references xml:lang="en" reference_type="PATCH">
  30.       <vuln:source>CONFIRM</vuln:source>
  31.       <vuln:reference href="http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64" xml:lang="en">http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64</vuln:reference>
  32.     </vuln:references>
  33.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  34.       <vuln:source>CONFIRM</vuln:source>
  35.       <vuln:reference href="https://mariadb.com/kb/en/mariadb-5535-changelog/" xml:lang="en">https://mariadb.com/kb/en/mariadb-5535-changelog/</vuln:reference>
  36.     </vuln:references>
  37.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  38.       <vuln:source>CONFIRM</vuln:source>
  39.       <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054592" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=1054592</vuln:reference>
  40.     </vuln:references>
  41.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  42.       <vuln:source>OSVDB</vuln:source>
  43.       <vuln:reference href="http://www.osvdb.org/102714" xml:lang="en">102714</vuln:reference>
  44.     </vuln:references>
  45.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  46.       <vuln:source>MANDRIVA</vuln:source>
  47.       <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2014:029" xml:lang="en">MDVSA-2014:029</vuln:reference>
  48.     </vuln:references>
  49.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  50.       <vuln:source>REDHAT</vuln:source>
  51.       <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0189.html" xml:lang="en">RHSA-2014:0189</vuln:reference>
  52.     </vuln:references>
  53.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  54.       <vuln:source>REDHAT</vuln:source>
  55.       <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0186.html" xml:lang="en">RHSA-2014:0186</vuln:reference>
  56.     </vuln:references>
  57.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  58.       <vuln:source>REDHAT</vuln:source>
  59.       <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0173.html" xml:lang="en">RHSA-2014:0173</vuln:reference>
  60.     </vuln:references>
  61.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  62.       <vuln:source>REDHAT</vuln:source>
  63.       <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0164.html" xml:lang="en">RHSA-2014:0164</vuln:reference>
  64.     </vuln:references>
  65.     <vuln:references xml:lang="en" reference_type="UNKNOWN">
  66.       <vuln:source>OSVDB</vuln:source>
  67.       <vuln:reference href="http://osvdb.org/102713" xml:lang="en">102713</vuln:reference>
  68.     </vuln:references>
  69.     <vuln:summary>Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.</vuln:summary>
  70.   </entry>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement