Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=417", "name": "20061005 Symantec AntiVirus IOCTL Kernel Privilege Escalation Vulnerability", "tags": ["Patch", "Vendor Advisory"], "refsource": "IDEFENSE"}, {"url": "http://www.symantec.com/avcenter/security/Content/2006.10.05a.html", "name": "http://www.symantec.com/avcenter/security/Content/2006.10.05a.html", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/20360", "name": "20360", "tags": ["Exploit", "Patch"], "refsource": "BID"}, {"url": "http://securitytracker.com/id?1016994", "name": "1016994", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://securitytracker.com/id?1016995", "name": "1016995", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://securitytracker.com/id?1016996", "name": "1016996", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://securitytracker.com/id?1016997", "name": "1016997", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://securitytracker.com/id?1016998", "name": "1016998", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://securitytracker.com/id?1016999", "name": "1016999", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://securitytracker.com/id?1017000", "name": "1017000", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://securitytracker.com/id?1017001", "name": "1017001", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://securitytracker.com/id?1017002", "name": "1017002", "tags": ["Exploit", "Patch"], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/22288", "name": "22288", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.kb.cert.org/vuls/id/946820", "name": "VU#946820", "tags": ["US Government Resource"], "refsource": "CERT-VN"}, {"url": "http://securityreason.com/securityalert/1690", "name": "1690", "tags": [], "refsource": "SREASON"}, {"url": "http://www.vupen.com/english/advisories/2006/3928", "name": "ADV-2006-3928", "tags": [], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29360", "name": "symantec-ioctl-privilege-escalation(29360)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/447849/100/0/threaded", "name": "20061005 [Reversemode Advisory] Symantec Antivirus Engine Privilege Escalation", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The (a) NAVENG (NAVENG.SYS) and (b) NAVEX15 (NAVEX15.SYS) device drivers 20061.3.0.12 and later, as used in Symantec AntiVirus and security products, allow local users to gain privileges by overwriting critical system addresses using a crafted Irp to the IOCTL functions (1) 0x222AD3, (2) 0x222AD7, and (3) 0x222ADB."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-4927", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-10-10T04:06Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:symantec:naveng_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:symantec:navex15_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-17T21:40Z"}