2024-12-08 03:06:42 +00:00

167 lines
4.9 KiB
JSON

{
"id": "CVE-2007-5300",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-10-09T18:17:00.000",
"lastModified": "2024-11-21T00:37:35.990",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Off-by-one error in the do_login_loop function in libwzd-core/wzd_login.c in wzdftpd 0.8.0, 0.8.2, and possibly other versions allows remote attackers to cause a denial of service (daemon crash) via a long USER command that triggers a stack-based buffer overflow. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Un error por un paso en la funci\u00f3n do_login_loop en el archivo libwzd-core/wzd_login.c en wzdftpd versiones 0.8.0, 0.8.2 y posiblemente otras versiones, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) por medio de un comando USER largo que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. NOTA: algunos de estos detalles son obtenidos de informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-189"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wzdftpd:wzdftpd:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0172A737-2184-41CE-916F-3EE6CF06D3EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wzdftpd:wzdftpd:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8582FFA6-2B03-49CA-BF1D-2BA6D88BC868"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/27091",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/28342",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1452",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25967",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/3389",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37008",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37010",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/4498",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/27091",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/28342",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1452",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/25967",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/3389",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37008",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37010",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.exploit-db.com/exploits/4498",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}