mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
297 lines
11 KiB
JSON
297 lines
11 KiB
JSON
{
|
|
"id": "CVE-2008-2375",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2008-07-09T00:41:00.000",
|
|
"lastModified": "2023-02-13T02:19:10.573",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Fuga de memoria en cierta implementaci\u00f3n de Red Hat de vsftpd anterior a 2.0.5 en Red Hat Enterprise Linux (RHEL) 3 y 4, cuando se utiliza PAM, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) mediante un gran n\u00famero de intentos de autenticaci\u00f3n no v\u00e1lidos en la misma sesi\u00f3n. Se trata de una vulnerabilidad diferente de CVE-2007-5962."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.1
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40D8DAE0-8E75-435C-9BD6-FAEED2ACB47C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F425AD1B-0D85-4294-9E9F-3EC1EFE0B658"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D305ED07-C6C8-437F-9B32-0E4A3AEEA3DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9E40C59-2A21-4CC5-BADA-AFB46386ADCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21DC1316-FF41-49F3-BF0C-09E0CFF70AE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6D4739B-BA4D-4D58-8C0C-F4DA1AC09D51"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79542EF5-EEED-4FBE-8722-D07907942643"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87C483DE-8DC5-4A74-8F7F-DB30AD63BB20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A24362D-12C1-4121-9E40-EA3A67A8BF82"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36708BE2-A437-4FF1-9A1E-772765C8FD5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FA26B597-CA83-4F62-90DF-CC103395B412"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64B83EAF-BE04-4DA4-B868-2A15B0D0C5BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B27B315-0C20-49F7-B638-E27C677CBAF4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FF5AC4C-397E-4AF7-846F-CAA72E93DA72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5001819C-C4DF-444D-945C-2577AD91A014"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA3FCFD0-A79F-447E-B5CF-7CF599E9BFDF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05DC66F1-ECC4-47AD-8F47-135FDA2E0A68"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EBF66A8-685E-4357-BC8C-D9E8CBFED91A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFBEABE0-DA68-4037-B044-0DD8E83A21F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:0.9.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "160A31D8-A7B2-425A-9D7F-124575D18825"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D266656-4DAD-4FA6-9874-21CA15952AB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42FBD1A1-CB90-4EE8-B192-2659AA3F961B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D50A535-D0C4-4A88-A6E3-23830B82BC29"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:1.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97626749-3A3C-4F91-971B-01CB01ED285A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38A8564D-8301-4F77-8349-06A723F20C1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88280371-39DB-45B5-BC79-85B05984123B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F149C664-511D-497F-84F7-90D9214F9E57"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1EDDC295-24D7-4E8B-A681-FD8099B1F1E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB23F46F-C33B-4CEA-AC7D-2A517A54D199"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B403417-3384-4E0E-A20A-F11D3572533D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0D786E6-7D73-45D1-88D8-2966E5FD237F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54922D08-A055-41EE-A818-BD3E6FA85494"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-398.htm",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0217",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2008/06/30/2",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0579.html",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0680.html",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/494081/100/0/threaded",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/30364",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1020546",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/2820",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/attachment.cgi?id=201051",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://issues.rpath.com/browse/RPL-2640",
|
|
"source": "secalert@redhat.com"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10138",
|
|
"source": "secalert@redhat.com"
|
|
}
|
|
]
|
|
} |