Show plain JSON{"id": "CVE-2012-0407", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2012-04-20T04:02:52.277", "references": [{"url": "http://aluigi.altervista.org/adv/dpa_1-adv.txt", "source": "security_alert@emc.com"}, {"url": "http://www.exploit-db.com/exploits/18688/", "source": "security_alert@emc.com"}, {"url": "http://www.securityfocus.com/archive/1/522408/30/0/threaded", "source": "security_alert@emc.com"}, {"url": "http://www.securitytracker.com/id?1026956", "source": "security_alert@emc.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-189"}]}], "descriptions": [{"lang": "en", "value": "Integer overflow in the DPA_Utilities library in EMC Data Protection Advisor (DPA) 5.5 through 5.8 SP1 allows remote attackers to cause a denial of service (infinite loop) via a negative 64-bit value in a certain size field."}, {"lang": "es", "value": "Desbordamiento de entero en la biblioteca DPA_Utilities de EMC Data Protection Advisor (DPA) v5.5 a v5.8 SP1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de un valor de 64-bits negativo en un determinado campo 'tama\u00f1o'."}], "lastModified": "2012-08-14T03:34:00.020", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:emc:data_protection_advisor:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "680208E2-56D1-4867-9B28-A867F0252FB1"}, {"criteria": "cpe:2.3:a:emc:data_protection_advisor:5.5:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0945F3BB-790E-4F38-B311-C056F8F1F774"}, {"criteria": "cpe:2.3:a:emc:data_protection_advisor:5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E71E518A-F416-4850-9F2B-7E93CD975381"}, {"criteria": "cpe:2.3:a:emc:data_protection_advisor:5.6:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "925F0652-1C6D-497B-ADF0-4248C0B2533F"}, {"criteria": "cpe:2.3:a:emc:data_protection_advisor:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30116207-86BD-4384-87C3-7919340DB5D3"}, {"criteria": "cpe:2.3:a:emc:data_protection_advisor:5.7:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28572343-8AAB-4249-9FA6-001757B83061"}, {"criteria": "cpe:2.3:a:emc:data_protection_advisor:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73341E0C-5EB7-45C9-9068-A77054704A2A"}, {"criteria": "cpe:2.3:a:emc:data_protection_advisor:5.8:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D72AB885-317E-4DF4-8FEF-689DCE3BCA92"}], "operator": "OR"}]}], "sourceIdentifier": "security_alert@emc.com"}