cve-2008-4578
Vulnerability from cvelistv5
Published
2008-10-15 20:00
Modified
2024-08-07 10:24
Severity ?
EPSS score ?
Summary
The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:24:19.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32164" }, { "name": "dovecot-acl-mailbox-security-bypass(45669)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45669" }, { "name": "33149", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33149" }, { "name": "ADV-2008-2745", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2745" }, { "name": "31587", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31587" }, { "name": "MDVSA-2008:232", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:232" }, { "name": "GLSA-200812-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200812-16.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=240409" }, { "name": "[Dovecot-news] 20081005 v1.1.4 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.dovecot.org/list/dovecot-news/2008-October/000085.html" }, { "name": "20081119 Re: [ MDVSA-2008:232 ] dovecot", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/498498/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the \"k\" right to create unauthorized \"parent/child/child\" mailboxes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "32164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32164" }, { "name": "dovecot-acl-mailbox-security-bypass(45669)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45669" }, { "name": "33149", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33149" }, { "name": "ADV-2008-2745", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2745" }, { "name": "31587", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31587" }, { "name": "MDVSA-2008:232", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:232" }, { "name": "GLSA-200812-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200812-16.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=240409" }, { "name": "[Dovecot-news] 20081005 v1.1.4 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.dovecot.org/list/dovecot-news/2008-October/000085.html" }, { "name": "20081119 Re: [ MDVSA-2008:232 ] dovecot", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/498498/100/0/threaded" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-4578", "datePublished": "2008-10-15T20:00:00", "dateReserved": "2008-10-15T00:00:00", "dateUpdated": "2024-08-07T10:24:19.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-4578\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-10-15T20:08:02.700\",\"lastModified\":\"2024-11-21T00:52:01.117\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the \\\"k\\\" right to create unauthorized \\\"parent/child/child\\\" mailboxes.\"},{\"lang\":\"es\",\"value\":\"El plugin ACL en Dovecot anterior a 1.1.4 permite a atacantes remotos evitar las restricciones de acceso previstas utilizando la \\\"k\\\" derecha para crear buzones de correo \\\"parent/child/child\\\" no autorizados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.3\",\"matchCriteriaId\":\"13310053-191A-4931-BA90-2D6F8850A7CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:0.99.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0616CCF-D278-4B6D-A58B-393BCA128CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:0.99.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C7BE64-7C1E-4043-A1C5-D0A7377C01A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4240BD98-3C31-42CE-AF8F-045DD4BFC084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C05ACA0-ED87-4DDF-94B6-8D25BE1790F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8C0C4A-F9DB-4BB7-BFC5-BEC22C3FE40B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7E00B56-A1E5-4261-8349-37654AA9FB64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66427AA-A9D4-413F-8354-EA61407307C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D74BE6C7-114D-4885-8472-FFE71C817B8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A349510-4D00-4978-93D9-3F9F5E0CD8DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B65B9EFD-1531-463C-992E-F0F16AABF9C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34BA7146-5793-44F4-9569-9D868FE6E325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5078363-6B42-491B-A219-F8D8A86132BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DDF093-B5C7-4AE5-B3D6-466C543AB2BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FBEF6C-4A09-4661-BED0-8B5BC8BAF1AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D680474-C329-4DD0-B4EA-2406E27EC474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"165A0D0B-C6B0-431F-BF36-223A27CD6A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92FB54D3-F856-4027-8AAF-6B05AE17D520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34759794-747B-4770-8DB5-4E07AA8A15AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D5AF2A0-3289-47FA-B8DB-D5E28504F012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99268D48-CF82-450B-A033-D87AF4109531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E09737-8107-45C0-BFF1-FB4CF81564CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.beta9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280BE28D-B8A8-4E76-BC96-DB756C00B994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E74D81-DF10-423A-8549-3BB5ED02B5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07D6853E-7E81-443D-8806-C8469217F55C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1BE4B6A-47A2-457B-B6B8-8FE5C2026A11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7382F655-9B27-443D-9397-346FBEADEFDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F180045-A0DA-40A3-AD3E-F3402FB6456A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A2FFE7-D008-47B4-80E7-AEC176918E06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C840337-7B31-476B-BBCD-65F4899925E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545EF2F5-9BAE-4612-9958-70A5413818A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E80096F8-46D9-42E3-8CDB-99ADA2CBD970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E504866-3429-4A4C-8278-5C2753D356C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30857130-636F-4719-9F1E-8F6369F40DAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9843D7CE-4723-4200-AFD4-5B31545A287E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AF1D92-D89B-4DE4-9D47-72466873A4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64A8FCA5-1666-48F7-9689-37D9315813F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D517F3-F0A8-4362-89B9-0ED63515283F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23883A94-559B-4655-82D4-F09868235771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"520B52BF-FD23-429D-BAA4-E08DB84C82F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B7948AB-2061-4ADB-A01C-3CE8B47CCD19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24F6BFB-AA8C-441A-9026-809183D0350E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C22A513A-A94A-4BC4-B5B7-3CCA166C9874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65038654-6B35-4502-BD74-F9F0954C5EF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4307AA80-C0AC-4193-8353-D746DBF52FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E95BAF5-FC78-4286-B6BD-464E9F08CF9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C6AA8FD-3692-4069-8980-9544044B8CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F22AADE9-D37D-439B-B934-8DA01A29BB87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECCD893-A5EE-4696-80AA-FD9092548BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B960D71-04E5-45F7-8DC2-45C341673FB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0.rc28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"658E275E-8C2C-46EE-850A-14ADBD097E0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.0_rc29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AAE9E7C-49CC-48C3-B47C-CDC5802356A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8BE860F-A3C2-43E0-BC75-503C437DAADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E6F249C-2793-46B5-A9E2-5EB3A62FF8E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E57B06-8650-4374-B643-6FCBE3ABDAF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0384E42-1506-4C08-AA5A-18B2A711C7F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5DC1CE5-50B9-426E-B98A-224DC499AB15\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=240409\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32164\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33149\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200812-16.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.dovecot.org/list/dovecot-news/2008-October/000085.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:232\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/498498/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/31587\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2745\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45669\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=240409\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200812-16.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.dovecot.org/list/dovecot-news/2008-October/000085.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:232\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498498/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/31587\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 5.\",\"lastModified\":\"2008-10-24T00:00:00\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.