CVE-2008-2375
Published Jul 9, 2008
Last updated 2 years ago
Overview
- Description
- Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "40D8DAE0-8E75-435C-9BD6-FAEED2ACB47C" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F425AD1B-0D85-4294-9E9F-3EC1EFE0B658" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D305ED07-C6C8-437F-9B32-0E4A3AEEA3DA" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9E40C59-2A21-4CC5-BADA-AFB46386ADCD" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21DC1316-FF41-49F3-BF0C-09E0CFF70AE2" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6D4739B-BA4D-4D58-8C0C-F4DA1AC09D51" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79542EF5-EEED-4FBE-8722-D07907942643" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87C483DE-8DC5-4A74-8F7F-DB30AD63BB20" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A24362D-12C1-4121-9E40-EA3A67A8BF82" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36708BE2-A437-4FF1-9A1E-772765C8FD5F" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA26B597-CA83-4F62-90DF-CC103395B412" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64B83EAF-BE04-4DA4-B868-2A15B0D0C5BB" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B27B315-0C20-49F7-B638-E27C677CBAF4" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FF5AC4C-397E-4AF7-846F-CAA72E93DA72" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5001819C-C4DF-444D-945C-2577AD91A014" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA3FCFD0-A79F-447E-B5CF-7CF599E9BFDF" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05DC66F1-ECC4-47AD-8F47-135FDA2E0A68" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EBF66A8-685E-4357-BC8C-D9E8CBFED91A" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFBEABE0-DA68-4037-B044-0DD8E83A21F3" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "160A31D8-A7B2-425A-9D7F-124575D18825" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D266656-4DAD-4FA6-9874-21CA15952AB4" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42FBD1A1-CB90-4EE8-B192-2659AA3F961B" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D50A535-D0C4-4A88-A6E3-23830B82BC29" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97626749-3A3C-4F91-971B-01CB01ED285A" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38A8564D-8301-4F77-8349-06A723F20C1B" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88280371-39DB-45B5-BC79-85B05984123B" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F149C664-511D-497F-84F7-90D9214F9E57" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EDDC295-24D7-4E8B-A681-FD8099B1F1E4" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB23F46F-C33B-4CEA-AC7D-2A517A54D199" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B403417-3384-4E0E-A20A-F11D3572533D" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0D786E6-7D73-45D1-88D8-2966E5FD237F" }, { "criteria": "cpe:2.3:a:redhat:vsftpd:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54922D08-A055-41EE-A818-BD3E6FA85494" } ], "operator": "OR" } ], "operator": "AND" } ]