Show plain JSON{"id": "CVE-2008-1994", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-04-27T21:05:00.000", "references": [{"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475733", "source": "cve@mitre.org"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476603", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/29909", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/28862", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41915", "source": "cve@mitre.org"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475733", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476603", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/29909", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/28862", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41915", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Multiple stack-based buffer overflows in (a) acon.c, (b) menu.c, and (c) child.c in Acon 1.0.5-5 through 1.0.5-7 allow local users to execute arbitrary code via (1) a long HOME environment variable or (2) a large number of terminal columns."}, {"lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en la pila en \r\n(a) acon.c,\r\n(b) menu.c, y \r\n(c) child.c en Acon 1.0.5-5 a 1.0.5.7 permiten a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n mediante \r\n(1) una variable de entorno HOME larga, o \r\n(2) un gran n\u00famero de columnas de terminal.\r\n"}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ahmed_abdel-hamid_mohamed:acon:1.0.5-5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A13B9D8-6AEB-4C87-A14C-B68F15E79AD9"}, {"criteria": "cpe:2.3:a:ahmed_abdel-hamid_mohamed:acon:1.0.5-6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EBB9004-122D-46BF-BD03-8DD81AA87978"}, {"criteria": "cpe:2.3:a:ahmed_abdel-hamid_mohamed:acon:1.0.5-7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5178570E-D3B6-402F-B190-778D6F637BA5"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}