Show plain JSON{"id": "CVE-2015-1817", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2017-08-18T16:29:00.217", "references": [{"url": "http://www.openwall.com/lists/oss-security/2015/03/30/3", "tags": ["Mailing List", "Patch", "VDB Entry"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/73408", "tags": ["Third Party Advisory", "VDB Entry"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2015/03/30/3", "tags": ["Mailing List", "Patch", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/73408", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors."}, {"lang": "es", "value": "Un desbordamiento de pila en la funci\u00f3n inet_pton en network/inet_pton.c en musl libc 0.9.15 en su versi\u00f3n 1.0.4 y 1.1.0 en su versi\u00f3n 1.1.7 permite que los atacantes tengan un impacto sin especificar mediante vectores desconocidos."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:musl-libc:musl:0.9.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0F488A5-244D-4F8C-AD94-56013B082D34"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1DBDE7C-E2C5-4CBD-8A24-2750B8D42DE9"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "727F49BA-FDA3-4377-B2EB-0464C6252776"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8318B985-B184-4244-8BF0-2BE8628A455D"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DCB454A-B1D4-44DF-B96B-AB86DBDEB0D8"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4F219B7-6155-4AF2-A119-412FBB497520"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8A819F9-8F60-4F67-B6F4-34289A30B220"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD0FA72D-58FD-41AB-B3F8-4833906F89DF"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE0BFC10-C9FA-47A9-AC13-21C55C3639E4"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE8904FC-24EB-46F4-A09A-746662B52763"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19DFD285-A4EB-4E5E-BE4B-E4BAB45DE428"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52E578DE-3047-44A9-B04A-BE151DAF44F6"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0451FABB-73D2-495D-9B89-7B120EBB160B"}, {"criteria": "cpe:2.3:a:musl-libc:musl:1.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C29E1CBE-FC06-4F70-B936-7B86AF986178"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}