Show plain JSON{"id": "CVE-2011-4062", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-10-18T01:55:01.530", "references": [{"url": "http://secunia.com/advisories/46202", "tags": ["Vendor Advisory"], "source": "secteam@freebsd.org"}, {"url": "http://secunia.com/advisories/46564", "source": "secteam@freebsd.org"}, {"url": "http://security.freebsd.org/advisories/FreeBSD-SA-11:05.unix.asc", "tags": ["Vendor Advisory"], "source": "secteam@freebsd.org"}, {"url": "http://security.freebsd.org/patches/SA-11:05/unix2.patch", "tags": ["Patch"], "source": "secteam@freebsd.org"}, {"url": "http://www.debian.org/security/2011/dsa-2325", "source": "secteam@freebsd.org"}, {"url": "http://www.exploit-db.com/exploits/17908", "tags": ["Exploit"], "source": "secteam@freebsd.org"}, {"url": "http://www.osvdb.org/75788", "source": "secteam@freebsd.org"}, {"url": "http://www.securityfocus.com/bid/49862", "source": "secteam@freebsd.org"}, {"url": "http://www.securitytracker.com/id?1026106", "source": "secteam@freebsd.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in the kernel in FreeBSD 7.3 through 9.0-RC1 allows local users to cause a denial of service (panic) or possibly gain privileges via a bind system call with a long pathname for a UNIX socket."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer en la \"emulaci\u00f3n de Linux\" de apoyo en FreeBSD v7.3 y v7.4, v8.1 y v8.2, y v9 antes de v9.0-RC1 permite a usuarios locales provocar una denegaci\u00f3n de servicio (p\u00e1nico) y posiblemente ejecutar c\u00f3digo arbitrario mediante una llamada al llamado sistema de vinculaci\u00f3n con un largo camino para un socket UNIX-domain, que no se manipula correctamente, cuando la direcci\u00f3n es utilizada por otras llamadas al sistema no especificado."}], "lastModified": "2011-12-13T04:09:18.627", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:freebsd:freebsd:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F25FB59-1E4F-4420-8482-8007FF5E2411"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C94B745-BD27-423D-BBB6-A821CD9BC1C4"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9899C87E-2C09-46AE-BC24-1ACF012784CA"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD5ECA1A-D9B4-4ED7-95EC-684E7AA2B765"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:9.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFBAF8FD-8266-46F4-836D-B0A24ECC817D"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:9.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D96D084-E1BC-437D-ACEB-B545078B8549"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:9.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5764F9ED-05B4-4334-AE65-45492DAB9119"}], "operator": "OR"}]}], "sourceIdentifier": "secteam@freebsd.org"}