CVE-2010-1938
Published May 28, 2010
Last updated 13 years ago
Overview
- Description
- Off-by-one error in the __opiereadrec function in readrec.c in libopie in OPIE 2.4.1-test1 and earlier, as used on FreeBSD 6.4 through 8.1-PRERELEASE and other platforms, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long username, as demonstrated by a long USER command to the FreeBSD 8.0 ftpd.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:6:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F135D976-52FD-477A-B3C3-9CDDB79ACCBB" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4F7F02A-C845-40BF-8490-510A070000F3" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53D1AD5E-4007-4AFA-A18B-69D1AC055C00" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:release_p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06BFEE54-DBF3-4546-AE57-2C25FC9F0F04" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:release_p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE1FC1A8-E499-45A0-B89A-5BFA24727DBD" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:release_p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E08DCB9-9064-4DB7-B43A-7B415882EB50" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:release_p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4A5E6FF-617E-4173-A948-F3728454A012" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06FB0EEA-254E-4A1F-99E7-058FCD518E22" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47E0A416-733A-4616-AE08-150D67FCEA70" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:beta_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDFA5AA9-E73F-448D-9754-41AF9AECB93A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:current:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4E775BA-6DC1-4006-83A4-D30EA57417FC" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:pre-release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42231BCC-2B90-4196-A1C2-408A353C1BEF" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF8CCA19-1CBF-406F-AF84-00E803423195" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:release-p12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0452688A-3E71-4BC9-8942-56ABBC47EA87" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:release-p8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "510ABA29-1AAA-4279-BAD2-B4624DC60A11" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:release-p9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A6C0249-951F-4352-92B2-E6A6CD5F26FF" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3556FE9-9949-4B8E-9E51-1205220B1A10" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "799D4A5E-7BF1-4B04-89DB-5C929938847B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0-release:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC290462-4364-464F-8CE9-6F5E5BE6F246" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0_beta4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F06B831E-D8F2-4380-B279-559CE103210F" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0_releng:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3ACC9072-4A33-4F1F-B790-2F9D5A52F71B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "803EFA9F-B7CB-4511-B1C1-381170CA9A23" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:pre-release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14D72C9B-EEB0-4605-BEA2-F77092129245" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52DBF406-9C77-4DDA-AB7D-40FAE40023D0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:release-p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20A31C9A-A928-4C9B-BB49-0E53227746DC" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:release-p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99FB7443-F942-402A-9104-64677EAF014E" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:release-p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "305A4C3D-C63D-4D1F-80FF-549182A0D9B5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:release-p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2A31704-E99F-4DBE-ABA4-EC3E566DE6CB" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:release-p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E634CDF4-F77B-4917-A452-907A771B5B0D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9A75104-5A3E-485E-B4EC-0873C942731C" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F948527C-A01E-4315-80B6-47FACE18A34F" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.2:pre-release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B573401-DC6F-4AFE-92F5-D96F785D2107" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.2:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60D40129-108B-421B-9990-6C6F381C96AD" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CF1F9EF-01AF-4708-AE02-765360AF3D66" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:8.1-prerelease:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B525B32B-417E-49C8-9847-A9F807FA67B0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:nrl:opie:*:test1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEEC73FC-2BB6-4B8F-9596-BBB287AFFDA2", "versionEndIncluding": "2.4.1" }, { "criteria": "cpe:2.3:a:nrl:opie:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D33B387-8EE6-4F36-A4B5-509FF8DA8C1E" }, { "criteria": "cpe:2.3:a:nrl:opie:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9B3734D-F6CB-4242-92FA-EDF425CCBCEF" }, { "criteria": "cpe:2.3:a:nrl:opie:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2B076A0-0216-4A52-ABA6-2E511FB6DB5E" }, { "criteria": "cpe:2.3:a:nrl:opie:2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32B7BBAB-609B-4D4D-BF5A-C4E95F0A8C51" }, { "criteria": "cpe:2.3:a:nrl:opie:2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5889C86D-4285-4B22-B3F0-76984D8CEC4B" }, { "criteria": "cpe:2.3:a:nrl:opie:2.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0779EF0-9638-474E-9EF2-971ADA10F1D9" }, { "criteria": "cpe:2.3:a:nrl:opie:2.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AEB7E9A-3F68-4F20-A073-751A76452C67" }, { "criteria": "cpe:2.3:a:nrl:opie:2.32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9A53F58-7514-4B07-AC56-C6F928F9D3F3" } ], "operator": "OR" } ] } ]