{ "id": "CVE-2004-2151", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", "lastModified": "2024-11-20T23:52:37.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Chatman 1.1.1 RC1 and earlier allows remote attackers to cause a denial of service (memory consumption or application crash) via a very large data size." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.0.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "BAFEF1D0-5FC0-4541-8197-6548E2BED59C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.0.2_beta:*:*:*:*:*:*:*", "matchCriteriaId": "BEE55EAE-076A-44B8-926B-9193C456CB55" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.0.3_beta:*:*:*:*:*:*:*", "matchCriteriaId": "5BCC47C2-7ACF-426C-902A-B685EF0AD345" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.0.4_beta:*:*:*:*:*:*:*", "matchCriteriaId": "0CA13012-E443-4200-B092-6088D4200B2C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.1.0_beta:*:*:*:*:*:*:*", "matchCriteriaId": "78182034-2ADC-43F2-9AD1-3570C9406898" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.1.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "B38AD148-5ACC-4157-8B7E-0982504B573B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.1.2_beta:*:*:*:*:*:*:*", "matchCriteriaId": "62CB5531-FD80-4C79-8D2C-7A7B74E3E02D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.1.3_beta:*:*:*:*:*:*:*", "matchCriteriaId": "11E6BDE7-D896-4474-B628-69645FD17566" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.1.4_beta:*:*:*:*:*:*:*", "matchCriteriaId": "05208F71-C594-4841-8F09-8E15D0FF743F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.1.5_beta:*:*:*:*:*:*:*", "matchCriteriaId": "95A2CE6B-9A95-497A-98DA-62DF34B92DC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.2.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "80D33D1A-C1CA-415D-BC2D-7B5476FB2BC3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.3.0_beta:*:*:*:*:*:*:*", "matchCriteriaId": "BAE1FF42-105A-4AEA-9F55-953D74F2ADCB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.3.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "9DE1ADAE-8B5E-4064-A3AA-908A580B5634" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.4.0_beta:*:*:*:*:*:*:*", "matchCriteriaId": "3B97CF4F-8BA6-4236-BDEC-302CD061C936" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.5.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "4087D37B-D540-479C-8E57-4FDE785D4E38" }, { "vulnerable": true, "criteria": "cpe:2.3:a:virtual_projects:chatman:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "14307C0C-7900-4E4E-AED3-E9346B9E031E" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/12665/", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1011431", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.osvdb.org/10365", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/376569", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/11263", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17513", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/12665/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1011431", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.osvdb.org/10365", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/376569", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/11263", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17513", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }