Advertisement
Guest User

Untitled

a guest
Jul 1st, 2014
579
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.26 KB | None | 0 0
  1.  
  2. <entry id="CVE-2014-0001">
  3. <vuln:vulnerable-configuration id="http://www.nist.gov/">
  4. <cpe-lang:logical-test negate="false" operator="OR">
  5. <cpe-lang:fact-ref name="cpe:/a:oracle:mysql:-"/>
  6. <cpe-lang:fact-ref name="cpe:/a:mariadb:mariadb:5.5.34"/>
  7. </cpe-lang:logical-test>
  8. </vuln:vulnerable-configuration>
  9. <vuln:vulnerable-software-list>
  10. <vuln:product>cpe:/a:mariadb:mariadb:5.5.34</vuln:product>
  11. <vuln:product>cpe:/a:oracle:mysql:-</vuln:product>
  12. </vuln:vulnerable-software-list>
  13. <vuln:cve-id>CVE-2014-0001</vuln:cve-id>
  14. <vuln:published-datetime>2014-01-31T18:55:04.503-05:00</vuln:published-datetime>
  15. <vuln:last-modified-datetime>2014-05-05T01:31:23.107-04:00</vuln:last-modified-datetime>
  16. <vuln:cvss>
  17. <cvss:base_metrics>
  18. <cvss:score>7.5</cvss:score>
  19. <cvss:access-vector>NETWORK</cvss:access-vector>
  20. <cvss:access-complexity>LOW</cvss:access-complexity>
  21. <cvss:authentication>NONE</cvss:authentication>
  22. <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
  23. <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
  24. <cvss:availability-impact>PARTIAL</cvss:availability-impact>
  25. <cvss:source>http://nvd.nist.gov</cvss:source>
  26. <cvss:generated-on-datetime>2014-02-03T11:10:48.857-05:00</cvss:generated-on-datetime>
  27. </cvss:base_metrics>
  28. </vuln:cvss>
  29. <vuln:cwe id="CWE-119"/>
  30. <vuln:references xml:lang="en" reference_type="PATCH">
  31. <vuln:source>CONFIRM</vuln:source>
  32. <vuln:reference href="http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64" xml:lang="en">http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64</vuln:reference>
  33. </vuln:references>
  34. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  35. <vuln:source>CONFIRM</vuln:source>
  36. <vuln:reference href="https://mariadb.com/kb/en/mariadb-5535-changelog/" xml:lang="en">https://mariadb.com/kb/en/mariadb-5535-changelog/</vuln:reference>
  37. </vuln:references>
  38. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  39. <vuln:source>CONFIRM</vuln:source>
  40. <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054592" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=1054592</vuln:reference>
  41. </vuln:references>
  42. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  43. <vuln:source>OSVDB</vuln:source>
  44. <vuln:reference href="http://www.osvdb.org/102714" xml:lang="en">102714</vuln:reference>
  45. </vuln:references>
  46. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  47. <vuln:source>MANDRIVA</vuln:source>
  48. <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2014:029" xml:lang="en">MDVSA-2014:029</vuln:reference>
  49. </vuln:references>
  50. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  51. <vuln:source>REDHAT</vuln:source>
  52. <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0189.html" xml:lang="en">RHSA-2014:0189</vuln:reference>
  53. </vuln:references>
  54. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  55. <vuln:source>REDHAT</vuln:source>
  56. <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0186.html" xml:lang="en">RHSA-2014:0186</vuln:reference>
  57. </vuln:references>
  58. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  59. <vuln:source>REDHAT</vuln:source>
  60. <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0173.html" xml:lang="en">RHSA-2014:0173</vuln:reference>
  61. </vuln:references>
  62. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  63. <vuln:source>REDHAT</vuln:source>
  64. <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0164.html" xml:lang="en">RHSA-2014:0164</vuln:reference>
  65. </vuln:references>
  66. <vuln:references xml:lang="en" reference_type="UNKNOWN">
  67. <vuln:source>OSVDB</vuln:source>
  68. <vuln:reference href="http://osvdb.org/102713" xml:lang="en">102713</vuln:reference>
  69. </vuln:references>
  70. <vuln:summary>Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.</vuln:summary>
  71. </entry>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement