CVE-2008-1207
Published Mar 8, 2008
Last updated 7 years ago
Overview
- Description
- Multiple unspecified vulnerabilities in Fujitsu Interstage Smart Repository, as used in multiple Fujitsu Interstage products, allow remote attackers to cause a denial of service (daemon crash) via (1) an invalid request or (2) a large amount of data sent to the registered attribute value.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_enterprise:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F96658B-B045-4EF6-9213-956925E92959" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_enterprise:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC713B96-0880-44BD-80BD-9DB3DBE74D94" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_enterprise:8.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F38322D-0458-4E4C-8E0D-F3F3D4282F07" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_enterprise:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA9D9EC2-91E3-463D-A878-AECAC40B2C41" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_enterprise:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC957D11-2D52-4EBC-9AB9-41A2259B0185" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_plus:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99321461-7570-48B8-9D08-B5D5F1B758C8" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_plus:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "819D76BD-9405-4B30-B15D-A312DDFF8252" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_standard_j:8.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1A8B45A-3D51-4013-A23D-E9A5F44CCA3B" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_standard_j:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43090F55-4B64-43FC-AE2C-6272C3DE4E3F" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_application_server_standard_j:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FCFE64D-676C-4716-8478-61C04B8365BA" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_apworks_enterprise:8.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9320240E-6A2B-4FDD-8802-0FA75F3A8A66" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_apworks_modelers_j:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E28F8057-175E-4B8E-8FDA-D75A823CAEAF" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_apworks_standard_j:8.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B68AB9B-617D-49D8-A3D6-1EA41CEF8581" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_business_application_server:8.0:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49DE1BE9-14CF-4BFD-9E8D-4C9F5399A992" }, { "criteria": "cpe:2.3:a:fujitsu:interstage_smart_repository:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1847A77-A520-422F-9547-F9EBA85AB31C" } ], "operator": "OR" } ] } ]