{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Lotus Domino server 5.0.9a and earlier allows remote attackers to cause a denial of service by exhausting the number of working threads via a large number of HTTP requests for (1) an MS-DOS device name and (2) an MS-DOS device name with a large number of characters appended to the device name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020204 KPMG-2002004: Lotus Domino Webserver DOS-device Denial of Service", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0037.html" }, { "name": "4020", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4020" }, { "name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/945e97608fda942a85256b37007905b1?OpenDocument&Highlight=0,JCHN547JWV", "refsource": "CONFIRM", "url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/945e97608fda942a85256b37007905b1?OpenDocument&Highlight=0,JCHN547JWV" }, { "name": "4019", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4019" }, { "name": "20020204 KPMG-2002004: Lotus Domino Webserver DOS-device Denial of Service", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/253830" }, { "name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/a77f8a5132cce70085256b8000792112?OpenDocument&Highlight=0,JCHN4UMKLA", "refsource": "CONFIRM", "url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/a77f8a5132cce70085256b8000792112?OpenDocument&Highlight=0,JCHN4UMKLA" } ] } }