cvelist/2017/7xxx/CVE-2017-7651.json

83 lines
2.6 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "emo@eclipse.org",
2017-10-16 12:31:07 -04:00
"ID" : "CVE-2017-7651",
"STATE" : "PUBLIC"
2017-10-16 12:31:07 -04:00
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Eclipse Mosquitto",
"version" : {
"version_data" : [
{
"version_value" : "1.4.14"
}
]
}
}
]
},
"vendor_name" : "The Eclipse Foundation"
}
]
}
},
2018-04-24 10:04:24 -04:00
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "In Eclipse Mosquitto 1.4.14, a user can shutdown the Mosquitto server simply by filling the RAM memory with a lot of connections with large payload. This can be done without authentications if occur in connection phase of MQTT protocol."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-789: Uncontrolled Memory Allocation"
}
]
}
]
},
"references" : {
"reference_data" : [
2018-04-25 06:05:26 -04:00
{
"name" : "[debian-lts-announce] 20180331 [SECURITY] [DLA 1334-1] mosquitto security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/03/msg00037.html"
},
2018-06-30 06:03:20 -04:00
{
"name" : "[debian-lts-announce] 20180629 [SECURITY] [DLA 1409-1] mosquitto security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/06/msg00016.html"
},
{
2018-04-24 10:04:24 -04:00
"name" : "https://bugs.eclipse.org/bugs/show_bug.cgi?id=529754",
"refsource" : "CONFIRM",
"url" : "https://bugs.eclipse.org/bugs/show_bug.cgi?id=529754"
2018-05-03 14:02:51 -04:00
},
{
"name" : "https://mosquitto.org/blog/2018/02/security-advisory-cve-2017-7651-cve-2017-7652/",
"refsource" : "CONFIRM",
"url" : "https://mosquitto.org/blog/2018/02/security-advisory-cve-2017-7651-cve-2017-7652/"
2018-10-26 06:08:08 -04:00
},
{
"name" : "DSA-4325",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4325"
2017-10-16 12:31:07 -04:00
}
]
}
}