ID CVE-2006-0477
Type cve
Reporter cve@mitre.org
Modified 2017-07-20T01:29:00
Description
Buffer overflow in git-checkout-index in GIT before 1.1.5 allows remote attackers to execute arbitrary code via an index file with a long symbolic link.
{"id": "CVE-2006-0477", "bulletinFamily": "NVD", "title": "CVE-2006-0477", "description": "Buffer overflow in git-checkout-index in GIT before 1.1.5 allows remote attackers to execute arbitrary code via an index file with a long symbolic link.", "published": "2006-01-31T11:03:00", "modified": "2017-07-20T01:29:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0477", "reporter": "cve@mitre.org", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/24360", "http://www.vupen.com/english/advisories/2006/0367", "http://secunia.com/advisories/18643", "http://lwn.net/Articles/169623/", "http://www.securityfocus.com/bid/16417"], "cvelist": ["CVE-2006-0477"], "type": "cve", "lastseen": "2019-05-29T18:08:30", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "dae53fe7c35737de8ad81784f17a2fbf"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "502d20ac13232f4def5c989d1d044f80"}, {"key": "cpe23", "hash": "a7dc7a7abf9979efd73164803bd2a727"}, {"key": "cvelist", "hash": "46e8c36e688fb417022da87222fa760d"}, {"key": "cvss", "hash": "0b053db5674b87efff89989a8a720df3"}, {"key": "cvss2", "hash": "a11071654cde664199dac48330e1f990"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "78a7a5cbaf09985c14389298e454e7db"}, {"key": "description", "hash": "58d029979b0171aff76bba05dc9e223e"}, {"key": "href", "hash": "593e06e23162eee74ff53a7d69d2d251"}, {"key": "modified", "hash": "8beb21540db0e4c02532c0e597356857"}, {"key": "published", "hash": "1e1b8bcd648c23bad0e534b6c17de12f"}, {"key": "references", "hash": "1d8108a018b109d5b0cfc356a8e0ec37"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "8c7a932c437b80368ce6c3cf2481e8db"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "5d6aedc531af1c0ffd9b415e07af9000dc54c2edf4e3f5ef2be76143cd25f2e4", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:22794"]}], "modified": "2019-05-29T18:08:30"}, "score": {"value": 7.7, "vector": "NONE", "modified": "2019-05-29T18:08:30"}, "vulnersScore": 7.7}, "objectVersion": "1.3", "cpe": ["cpe:/a:git:git:1.1.0", "cpe:/a:git:git:1.1.1", "cpe:/a:git:git:1.0.8", "cpe:/a:git:git:1.0.3", "cpe:/a:git:git:1.0.0", "cpe:/a:git:git:1.0.0b", "cpe:/a:git:git:1.1.4", "cpe:/a:git:git:1.0.7", "cpe:/a:git:git:1.0.5", "cpe:/a:git:git:1.0.6", "cpe:/a:git:git:1.1.3", "cpe:/a:git:git:1.1.2", "cpe:/a:git:git:1.0.4"], "affectedSoftware": [{"name": "git git", "operator": "eq", "version": "1.0.7"}, {"name": "git git", "operator": "eq", "version": "1.1.2"}, {"name": "git git", "operator": "eq", "version": "1.0.0"}, {"name": "git git", "operator": "eq", "version": "1.0.0b"}, {"name": "git git", "operator": "eq", "version": "1.0.3"}, {"name": "git git", "operator": "eq", "version": "1.1.3"}, {"name": "git git", "operator": "eq", "version": "1.0.6"}, {"name": "git git", "operator": "eq", "version": "1.0.5"}, {"name": "git git", "operator": "eq", "version": "1.0.8"}, {"name": "git git", "operator": "eq", "version": "1.1.0"}, {"name": "git git", "operator": "eq", "version": "1.0.4"}, {"name": "git git", "operator": "eq", "version": "1.1.4"}, {"name": "git git", "operator": "eq", "version": "1.1.1"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:git:git:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.5:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"]}
{"osvdb": [{"lastseen": "2017-04-28T13:20:19", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 1.1.5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://www.kernel.org/pub/software/scm/git/\n[Secunia Advisory ID:18643](https://secuniaresearch.flexerasoftware.com/advisories/18643/)\nMail List Post: http://lwn.net/Articles/169623/\nFrSIRT Advisory: ADV-2006-0367\n[CVE-2006-0477](https://vulners.com/cve/CVE-2006-0477)\nBugtraq ID: 16417\n", "modified": "2006-01-27T04:18:22", "published": "2006-01-27T04:18:22", "href": "https://vulners.com/osvdb/OSVDB:22794", "id": "OSVDB:22794", "type": "osvdb", "title": "GIT git-checkout-index Symbolic Link Handling Overflow", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}