CVE-2010-0305
Published Feb 3, 2010
Last updated 7 years ago
Overview
- Description
- ejabberd_c2s.erl in ejabberd before 2.1.3 allows remote attackers to cause a denial of service (daemon crash) via a large number of c2s (aka client2server) messages that trigger a queue overload.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:process-one:ejabberd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57AFE271-C9D3-400A-9DDA-4FBED4BBFC86", "versionEndIncluding": "2.1.2" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "666E7908-0690-4DFE-8141-07F2D15E5404" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDFFF6D6-C749-4D07-85A5-E6D343FC4243" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6EE1B8F-0FDB-4E00-A15A-C107DCDB93BB" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18E7EDE8-298E-444E-A624-0202705C516C" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C81B5565-94A8-4F03-A846-3C3F842B909D" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC959279-43D7-4CB0-A845-25D4DE92E06A" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46528149-3D63-4E68-9209-DAFA55B3A855" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6D5B249-4D6D-4B15-9348-2C7C0A0B82E6" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2425925-5ACB-4BE4-9C98-F028647AAF2F" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB7AF867-ED0A-428A-A53D-E20B733EBAF0" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4409695C-2A6C-4D27-9DB9-D0BD653487E4" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F78A11B2-2110-4372-8579-DDA24691C18A" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "906C248B-FFD7-4EF0-A181-BACE05B324AD" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36B7CC0A-CD37-4E31-9A99-41E59EB46E36" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.1_2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F401CBE2-80FC-4D64-A21B-5966330E9C08" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B0CBC37-5A98-4067-93FF-6B637F9C7EDC" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE7C5587-2FB0-4D05-ABB0-0C566964971D" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00AB30D9-688A-4F14-BEAF-7B3FBAF719C3" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AC9F432-B650-4AAC-86B5-5C5A037057E8" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25B4CDF3-43DC-4F5B-B8BC-76E08C5B8C67" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50123C8E-2164-4239-A2DB-8CF60459EBF1" } ], "operator": "OR" } ] } ]