mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
97 lines
2.9 KiB
JSON
97 lines
2.9 KiB
JSON
{
|
|
"id": "CVE-2008-5105",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-11-17T18:18:48.077",
|
|
"lastModified": "2018-10-11T20:54:06.083",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "KarjaSoft Sami FTP Server 2.0.x allows remote attackers to cause a denial of service (daemon crash or hang) via certain (1) APPE, (2) CWD, (3) DELE, (4) MKD, (5) RMD, (6) RETR, (7) RNFR, (8) RNTO, (9) SIZE, and (10) STOR commands."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El servidor FTP KarjaSoft Sami FTP Server 2.0.x permite a atacantes remotos causar una denegaci\u00f3n de servicio (caida o bloqueo del demonio) a trav\u00e9s de algunos comandos (1) APPE, (2) CWD, (3) DELE, (4) MKD, (5) RMD, ( 6) RETR, (7) RNFR, (8) RNTO, (9) SIZE, y (10) STOR."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:karjasoft:sami_ftp_server:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "218CACF2-A382-4483-9319-889B9E2FB208"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:karjasoft:sami_ftp_server:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE91DCB5-8314-473B-A8D0-06B53B02FC51"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:karjasoft:sami_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "075B214B-CFFE-408E-B341-FF9C5B43A51E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/4603",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/488198/100/200/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/27817",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |