VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
CVE-2013-7105
interstage_application_server, interstage_studio: Buffer overflow in the Interstage HTTP Server log f...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7105

原文

Buffer overflow in the Interstage HTTP Server log functionality, as used in Fujitsu Interstage Application Server 9.0.0, 9.1.0, 9.2.0, 9.3.1, and 10.0.0; and Interstage Studio 9.0.0, 9.1.0, 9.2.0, and 10.0.0, has unspecified impact and attack vectors related to "ihsrlog/rotatelogs."

翻訳   (表示)





この情報について
分析情報提供元:
NIST NVD
初版公開日:
2013-12-14
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2013-12-17




脆弱性の影響を受ける製品の識別子
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_application_server%3A10.0.0&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_application_server:10.0.0" id="j_id242:0:0:0:4:j_id249" target="_blank">cpe:/a:fujitsu:interstage_application_server:10.0.0</a>
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_application_server%3A9.0.0&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_application_server:9.0.0" id="j_id242:0:0:0:0:j_id249" target="_blank">cpe:/a:fujitsu:interstage_application_server:9.0.0</a>
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_application_server%3A9.1.0&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_application_server:9.1.0" id="j_id242:0:0:0:1:j_id249" target="_blank">cpe:/a:fujitsu:interstage_application_server:9.1.0</a>
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_application_server%3A9.2.0&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_application_server:9.2.0" id="j_id242:0:0:0:2:j_id249" target="_blank">cpe:/a:fujitsu:interstage_application_server:9.2.0</a>
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_application_server%3A9.3.1&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_application_server:9.3.1" id="j_id242:0:0:0:3:j_id249" target="_blank">cpe:/a:fujitsu:interstage_application_server:9.3.1</a>
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_studio%3A10.0.0&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_studio:10.0.0" id="j_id242:0:0:0:8:j_id249" target="_blank">cpe:/a:fujitsu:interstage_studio:10.0.0</a>
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_studio%3A9.0.0&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_studio:9.0.0" id="j_id242:0:0:0:5:j_id249" target="_blank">cpe:/a:fujitsu:interstage_studio:9.0.0</a>
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_studio%3A9.1.0&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_studio:9.1.0" id="j_id242:0:0:0:6:j_id249" target="_blank">cpe:/a:fujitsu:interstage_studio:9.1.0</a>
cpe/search/results;jsessionid=AE2FBA57BAB4EEA4AEC716725A621161?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Afujitsu%3Ainterstage_studio%3A9.2.0&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:fujitsu:interstage_studio:9.2.0" id="j_id242:0:0:0:7:j_id249" target="_blank">cpe:/a:fujitsu:interstage_studio:9.2.0</a>
 


脆弱性の分析内容
[攻撃元区分]  [?]
未評価 [?]

ローカル [?]
隣接 [?]
X ネットワーク [?]

[攻撃条件の複雑さ]  [?]
未評価 [?]

 [?]
 [?]
X [?]

[攻撃前の認証要否]  [?]
未評価 [?]

複数 [?]
単一 [?]
X 不要 [?]

[機密性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

[完全性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

[可用性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

関連情報




参考情報
CONFIRM http://www.fujitsu.com/global/support/software/security/products-f/interstage-201302e.html




SECTRACK 1029398




Vulnerability Type Buffer Errors (CWE-119)





Copyright © 2013 JPCERT/CC All Rights Reserved.