2025-04-09 02:05:49 +00:00

125 lines
4.1 KiB
JSON

{
"id": "CVE-2007-2765",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-05-18T22:30:00.000",
"lastModified": "2025-04-09T00:30:58.490",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "blockhosts.py in BlockHosts before 2.0.3 does not properly parse daemon log files, which allows remote attackers to add arbitrary deny entries to the /etc/hosts.allow file and cause a denial of service by adding arbitrary IP addresses to a daemon log file, as demonstrated by logging in through ssh using a login name containing certain strings with an IP address, which is not properly handled by a regular expression, a related issue to CVE-2006-6301."
},
{
"lang": "es",
"value": "El blockhosts.py en el BlockHosts anterior al 2.0.3 no analiza la sint\u00e1sis correctamente de los ficheros de trazas del demonio, lo que permite a atacantes remotos a\u00f1adir denegaciones de entradas de su elecci\u00f3n en el fichero /etc/hosts.allow y provocar una denegaci\u00f3n de servicio a\u00f1adiendo direcciones IP de su elecci\u00f3n en el fichero de trazas del demonio, como lo demostrado valid\u00e1ndose en el sistema con ssh usando un nombre que contiene ciertas cadenas con direcciones IP, lo que no es manejado correctamente por las expresiones regulares. Relacionada con la vulnerabilidad CVE-2006-6301."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ac_zoom:blockhosts:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.2",
"matchCriteriaId": "DE64C5D4-E9F0-43EB-B9EB-AC1884EDE9CE"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/36516",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/25352",
"source": "cve@mitre.org"
},
{
"url": "http://www.aczoom.com/tools/blockhosts/CHANGES",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/24090",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1906",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34426",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/36516",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/25352",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.aczoom.com/tools/blockhosts/CHANGES",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/24090",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1906",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34426",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}