Show plain JSON{"id": "CVE-2006-7139", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.6, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "HIGH", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2007-03-07T20:19:00.000", "references": [{"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0293.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/24889", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/2347", "source": "cve@mitre.org"}, {"url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/448766/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/448768/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/20539", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29557", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "Kmail 1.9.1 on KDE 3.5.2, with \"Prefer HTML to Plain Text\" enabled, allows remote attackers to cause a denial of service (crash) via an HTML e-mail with certain table and frameset tags that trigger a segmentation fault, possibly involving invalid free or delete operations."}, {"lang": "es", "value": "Kmail 1.9.1 en el KDE 3.5.2, con el \"Preferencia de HTML frente al Texto Plano\" habilitado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante un e-mail HTML con ciertas tables y etiquetas frameset lo que disparan un fallo de segmentaci\u00f3n, posiblemente involucrando operaciones no v\u00e1lidas de borrado o libres."}], "lastModified": "2018-10-16T16:29:32.587", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:kde:kde:3.5.2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "67C992C7-E81D-443B-ACE8-B92F8A36C1FD"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:kde:k-mail:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "925F378D-19C9-47BA-A769-C1888A39DB3A"}], "operator": "OR"}], "operator": "AND"}], "vendorComments": [{"comment": "Not vulnerable. Our testing found that this issue did not affect the versions of Kmail as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.", "lastModified": "2007-03-08T00:00:00", "organization": "Red Hat"}], "sourceIdentifier": "cve@mitre.org"}