Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://lists.freedesktop.org/archives/xorg/2006-June/016146.html", "name": "[xorg] 20060620 X.Org security advisory: setuid return value check problems", "tags": ["Patch"], "refsource": "MLIST"}, {"url": "http://security.gentoo.org/glsa/glsa-200608-25.xml", "name": "GLSA-200608-25", "tags": ["Patch", "Vendor Advisory"], "refsource": "GENTOO"}, {"url": "http://www.securityfocus.com/bid/19742", "name": "19742", "tags": [], "refsource": "BID"}, {"url": "http://secunia.com/advisories/21650", "name": "21650", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/21660", "name": "21660", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/21693", "name": "21693", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.debian.org/security/2006/dsa-1193", "name": "DSA-1193", "tags": [], "refsource": "DEBIAN"}, {"url": "http://secunia.com/advisories/22332", "name": "22332", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.kb.cert.org/vuls/id/300368", "name": "VU#300368", "tags": ["US Government Resource"], "refsource": "CERT-VN"}, {"url": "http://mail.gnome.org/archives/beast/2006-December/msg00025.html", "name": "[beast] 20061228 ANNOUNCE: BEAST/BSE v0.7.1", "tags": [], "refsource": "MLIST"}, {"url": "http://security.gentoo.org/glsa/glsa-200704-22.xml", "name": "GLSA-200704-22", "tags": [], "refsource": "GENTOO"}, {"url": "http://www.securityfocus.com/bid/23697", "name": "23697", "tags": [], "refsource": "BID"}, {"url": "http://secunia.com/advisories/25032", "name": "25032", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/25059", "name": "25059", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:160", "name": "MDKSA-2006:160", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://www.vupen.com/english/advisories/2007/0409", "name": "ADV-2007-0409", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/3409", "name": "ADV-2006-3409", "tags": [], "refsource": "VUPEN"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-4447", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-08-30T01:04Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:x.org:x11r6:6.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:x11r6:6.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:xload:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:xorg-server:1.02_r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:emu-linux-x87-xlibs:7.0_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:x11r6:6.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:x11r6:6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:xf86dga:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:xinit:1.0.2_r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:x11r7:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:x11r7:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:x11r7:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:xterm:214:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:x.org:xdm:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2011-03-08T02:40Z"}