Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://issues.rpath.com/browse/RPL-2317", "name": "https://issues.rpath.com/browse/RPL-2317", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:068", "name": "MDVSA-2008:068", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0196.html", "name": "RHSA-2008:0196", "tags": ["Vendor Advisory"], "refsource": "REDHAT"}, {"url": "http://secunia.com/advisories/29427", "name": "29427", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/29440", "name": "29440", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/29415", "name": "29415", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0116", "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0116", "tags": [], "refsource": "CONFIRM"}, {"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0116", "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0116", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.debian.org/security/2008/dsa-1522", "name": "DSA-1522", "tags": [], "refsource": "DEBIAN"}, {"url": "http://www.ubuntu.com/usn/usn-589-1", "name": "USN-589-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://www.securityfocus.com/bid/28288", "name": "28288", "tags": [], "refsource": "BID"}, {"url": "http://www.securitytracker.com/id?1019634", "name": "1019634", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/29432", "name": "29432", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/29406", "name": "29406", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/29495", "name": "29495", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html", "name": "SUSE-SR:2008:007", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/29392", "name": "29392", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://security.gentoo.org/glsa/glsa-200804-06.xml", "name": "GLSA-200804-06", "tags": [], "refsource": "GENTOO"}, {"url": "http://secunia.com/advisories/29681", "name": "29681", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html", "name": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/30535", "name": "30535", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.ipcop.org/index.php?name=News&file=article&sid=40", "name": "http://www.ipcop.org/index.php?name=News&file=article&sid=40", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/31204", "name": "31204", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://support.apple.com/kb/HT4077", "name": "http://support.apple.com/kb/HT4077", "tags": [], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html", "name": "APPLE-SA-2010-03-29-1", "tags": [], "refsource": "APPLE"}, {"url": "http://www.vupen.com/english/advisories/2008/0913/references", "name": "ADV-2008-0913", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/1744", "name": "ADV-2008-1744", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41246", "name": "unzip-inflatedynamic-code-execution(41246)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9733", "name": "oval:org.mitre.oval:def:9733", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded", "name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/489967/100/0/threaded", "name": "20080321 rPSA-2008-0116-1 unzip", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2008-0888", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2008-03-17T21:44Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:info-zip:unzip:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-15T22:03Z"}