Show plain JSON{"id": "CVE-2014-6603", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-10-07T14:55:07.517", "references": [{"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139630.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139821.html", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/128382/Suricata-2.0.3-Out-Of-Bounds-Access.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2014/Sep/79", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/533515/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/70083", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96157", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "The SSHParseBanner function in SSH parser (app-layer-ssh.c) in Suricata before 2.0.4 allows remote attackers to bypass SSH rules, cause a denial of service (crash), or possibly have unspecified other impact via a crafted banner, which triggers a large memory allocation or an out-of-bounds write."}, {"lang": "es", "value": "La funci\u00f3n SSHParseBanner en SSH parser (app-layer-ssh.c) en Suricata anterior a 2.0.4 permite a atacantes remotos evadir las normas SSH, causar una denegaci\u00f3n de servicio (ca\u00edda), o posiblemente tener otro impacto no especificado a trav\u00e9s de un banner manipulado, lo que provoca una reserva de memoria grande o una escritura fuera de rango."}], "lastModified": "2018-10-09T19:51:23.957", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "264259AB-D095-4937-AA55-EC6C18AB7AC2", "versionEndIncluding": "2.0.3-2"}, {"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:2.0.1-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BB77C7F-7283-46A6-8C81-086BFC081E85"}, {"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:2.0.1-2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C34D49DB-60C7-4DCC-B0A7-D8A2609C9185"}, {"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:2.0.2-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48850034-C8C8-45EC-8BB8-000671C2AFA5"}, {"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:2.0.2-2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36425BC4-8A63-48A1-9209-C4401255629B"}, {"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:2.0.3-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "752330B0-3AC1-4604-BD2B-7C444E233235"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}