Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-4225

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-25 Nov, 2008 | 23:00
Updated At-07 Aug, 2024 | 10:08
Rejected At-
Credits

Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:25 Nov, 2008 | 23:00
Updated At:07 Aug, 2024 | 10:08
Rejected At:
▼CVE Numbering Authority (CNA)

Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/32766
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT3639
x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1
x_refsource_CONFIRM
http://secunia.com/advisories/32773
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/1621
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1
x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/32807
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
vendor-advisory
x_refsource_APPLE
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/32764
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2009-0001.html
x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-673-1
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2009/0301
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10025
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/33746
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1021239
vdb-entry
x_refsource_SECTRACK
https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/0034
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/34247
third-party-advisory
x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2009-067.htm
x_refsource_CONFIRM
http://www.osvdb.org/49992
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/36173
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/1522
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1
vendor-advisory
x_refsource_SUNALERT
http://security.gentoo.org/glsa/glsa-200812-06.xml
vendor-advisory
x_refsource_GENTOO
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
vendor-advisory
x_refsource_APPLE
http://support.avaya.com/elmodocs2/security/ASA-2009-002.htm
x_refsource_CONFIRM
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974
vendor-advisory
x_refsource_SLACKWARE
http://wiki.rpath.com/Advisories:rPSA-2008-0325
x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1666
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/32802
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/35379
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/32974
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6415
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/33792
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/36235
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/32762
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
vendor-advisory
x_refsource_SUNALERT
http://www.redhat.com/support/errata/RHSA-2008-0988.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/33417
third-party-advisory
x_refsource_SECUNIA
https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10
x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
vendor-advisory
x_refsource_SUNALERT
https://bugzilla.redhat.com/show_bug.cgi?id=470480
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2008:231
vendor-advisory
x_refsource_MANDRIVA
http://www.securityfocus.com/bid/32331
vdb-entry
x_refsource_BID
http://support.apple.com/kb/HT3613
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/0323
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/32811
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/3176
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6234
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/32766
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT3639
Resource:
x_refsource_CONFIRM
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/32773
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2009/1621
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/32807
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/32764
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2009-0001.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ubuntu.com/usn/usn-673-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2009/0301
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10025
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/33746
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1021239
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2009/0034
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/34247
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2009-067.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.osvdb.org/49992
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/36173
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2009/1522
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2009-002.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2008-0325
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2008/dsa-1666
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/32802
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/35379
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/32974
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6415
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/33792
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/36235
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/32762
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0988.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/33417
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10
Resource:
x_refsource_CONFIRM
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=470480
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:231
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.securityfocus.com/bid/32331
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://support.apple.com/kb/HT3613
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2009/0323
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/32811
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/3176
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6234
Resource:
vdb-entry
signature
x_refsource_OVAL
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/32766
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT3639
x_refsource_CONFIRM
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/32773
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2009/1621
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1
x_refsource_CONFIRM
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/32807
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/32764
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2009-0001.html
x_refsource_CONFIRM
x_transferred
http://www.ubuntu.com/usn/usn-673-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2009/0301
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10025
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/33746
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1021239
vdb-entry
x_refsource_SECTRACK
x_transferred
https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2009/0034
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/34247
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2009-067.htm
x_refsource_CONFIRM
x_transferred
http://www.osvdb.org/49992
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/36173
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2009/1522
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://security.gentoo.org/glsa/glsa-200812-06.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2009-002.htm
x_refsource_CONFIRM
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://wiki.rpath.com/Advisories:rPSA-2008-0325
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2008/dsa-1666
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/32802
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/35379
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/32974
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6415
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/33792
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/36235
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/32762
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0988.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/33417
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10
x_refsource_CONFIRM
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=470480
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:231
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.securityfocus.com/bid/32331
vdb-entry
x_refsource_BID
x_transferred
http://support.apple.com/kb/HT3613
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2009/0323
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/32811
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/3176
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6234
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/32766
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT3639
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/32773
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/1621
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/32807
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/32764
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2009-0001.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-673-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0301
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10025
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/33746
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1021239
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0034
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/34247
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2009-067.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.osvdb.org/49992
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/36173
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/1522
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2009-002.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2008-0325
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1666
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/32802
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/35379
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/32974
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6415
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/33792
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/36235
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/32762
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0988.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/33417
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=470480
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:231
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/32331
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://support.apple.com/kb/HT3613
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0323
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/32811
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/3176
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6234
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:25 Nov, 2008 | 23:30
Updated At:29 Sep, 2017 | 01:32

Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

libxml2 (XMLSoft)
xmlsoft
>>libxml>>2.7.2
cpe:2.3:a:xmlsoft:libxml:2.7.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.htmlcve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.htmlcve@mitre.org
N/A
http://secunia.com/advisories/32762cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32764cve@mitre.org
Patch
http://secunia.com/advisories/32766cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32773cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32802cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32807cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32811cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32974cve@mitre.org
N/A
http://secunia.com/advisories/33417cve@mitre.org
N/A
http://secunia.com/advisories/33746cve@mitre.org
N/A
http://secunia.com/advisories/33792cve@mitre.org
N/A
http://secunia.com/advisories/34247cve@mitre.org
N/A
http://secunia.com/advisories/35379cve@mitre.org
N/A
http://secunia.com/advisories/36173cve@mitre.org
N/A
http://secunia.com/advisories/36235cve@mitre.org
N/A
http://security.gentoo.org/glsa/glsa-200812-06.xmlcve@mitre.org
N/A
http://securitytracker.com/id?1021239cve@mitre.org
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1cve@mitre.org
N/A
http://support.apple.com/kb/HT3613cve@mitre.org
N/A
http://support.apple.com/kb/HT3639cve@mitre.org
N/A
http://support.avaya.com/elmodocs2/security/ASA-2009-002.htmcve@mitre.org
N/A
http://support.avaya.com/elmodocs2/security/ASA-2009-067.htmcve@mitre.org
N/A
http://wiki.rpath.com/Advisories:rPSA-2008-0325cve@mitre.org
N/A
http://www.debian.org/security/2008/dsa-1666cve@mitre.org
Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2008:231cve@mitre.org
N/A
http://www.osvdb.org/49992cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0988.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/32331cve@mitre.org
Patch
http://www.ubuntu.com/usn/usn-673-1cve@mitre.org
N/A
http://www.vmware.com/security/advisories/VMSA-2009-0001.htmlcve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/3176cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/0034cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/0301cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/0323cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/1522cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/1621cve@mitre.org
N/A
https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10cve@mitre.org
Patch
https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9cve@mitre.org
Patch
https://bugzilla.redhat.com/show_bug.cgi?id=470480cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10025cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6234cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6415cve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.htmlcve@mitre.org
N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/32762
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/32764
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://secunia.com/advisories/32766
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/32773
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/32802
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/32807
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/32811
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/32974
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/33417
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/33746
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/33792
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/34247
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/35379
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/36173
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/36235
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-06.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1021239
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3613
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3639
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2009-002.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2009-067.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2008-0325
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1666
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:231
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/49992
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0988.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/32331
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.ubuntu.com/usn/usn-673-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2009-0001.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/3176
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/0034
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/0301
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/0323
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/1522
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/1621
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=470480
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10025
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6234
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6415
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

20Records found

CVE-2009-4536
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.59% / 80.87%
||
7 Day CHG~0.00%
Published-12 Jan, 2010 | 17:00
Updated-07 Aug, 2024 | 07:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-189
Not Available
CVE-2009-2524
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-46.38% / 97.57%
||
7 Day CHG~0.00%
Published-14 Oct, 2009 | 10:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer underflow in the NTLM authentication feature in the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to cause a denial of service (reboot) via a malformed packet, aka "Local Security Authority Subsystem Service Integer Overflow Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_vistawindows_2003_serverwindows_xpwindows_7windows_server_2008n/a
CWE ID-CWE-189
Not Available
CVE-2009-3282
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.44% / 62.33%
||
7 Day CHG~0.00%
Published-16 Oct, 2009 | 16:00
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 allows host OS users to cause a denial of service to the host OS via unspecified vectors.

Action-Not Available
Vendor-n/aApple Inc.VMware (Broadcom Inc.)
Product-fusionmac_os_xn/a
CWE ID-CWE-189
Not Available
CVE-2009-1385
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-10.76% / 93.05%
||
7 Day CHG~0.00%
Published-04 Jun, 2009 | 16:00
Updated-07 Aug, 2024 | 05:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel Corporation
Product-kernellinux_kernele1000n/a
CWE ID-CWE-189
Not Available
CVE-2009-1250
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-5.85% / 90.20%
||
7 Day CHG~0.00%
Published-09 Apr, 2009 | 00:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58, and IBM AFS 3.6 before Patch 19, on Linux allows remote attackers to cause a denial of service (system crash) via an RX response with a large error-code value that is interpreted as a pointer and dereferenced, related to use of the ERR_PTR macro.

Action-Not Available
Vendor-openafsn/aIBM CorporationLinux Kernel Organization, Inc
Product-openafsafslinux_kerneln/a
CWE ID-CWE-189
Not Available
CVE-2009-2539
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.24% / 78.42%
||
7 Day CHG~0.00%
Published-20 Jul, 2009 | 18:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Aigo P8860 allows remote attackers to cause a denial of service (memory consumption and browser hang) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.

Action-Not Available
Vendor-aigon/a
Product-aigo_md_p8860n/a
CWE ID-CWE-189
Not Available
CVE-2008-2726
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-1.57% / 80.77%
||
7 Day CHG~0.00%
Published-24 Jun, 2008 | 19:00
Updated-07 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Ruby
Product-ubuntu_linuxdebian_linuxrubyn/a
CWE ID-CWE-189
Not Available
CVE-2008-3135
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.48% / 80.20%
||
7 Day CHG~0.00%
Published-10 Jul, 2008 | 23:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Soldner Secret Wars 33724 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a packet with a large numeric value in a 0x80 data block.

Action-Not Available
Vendor-secretwarsn/a
Product-soldner_secret_warsn/a
CWE ID-CWE-189
Not Available
CVE-2008-2725
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-1.57% / 80.77%
||
7 Day CHG~0.00%
Published-24 Jun, 2008 | 19:00
Updated-07 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Ruby
Product-ubuntu_linuxdebian_linuxrubyn/a
CWE ID-CWE-189
Not Available
CVE-2008-1667
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-5.59% / 89.93%
||
7 Day CHG~0.00%
Published-29 Jul, 2008 | 18:00
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Probe Builder Service (aka PBOVISServer.exe) in European Performance Systems (EPS) Probe Builder 2.2 before A.02.20.901, as used in HP OpenView Internet Services (OVIS) on Windows, allows remote attackers to kill arbitrary processes via a process ID number in an unspecified opcode.

Action-Not Available
Vendor-epsn/aHP Inc.
Product-probe_builderopenview_internet_servicesn/a
CWE ID-CWE-189
Not Available
CVE-2007-6523
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.35% / 79.27%
||
7 Day CHG~0.00%
Published-24 Dec, 2007 | 20:00
Updated-07 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Algorithmic complexity vulnerability in Opera 9.50 beta and 9.x before 9.25 allows remote attackers to cause a denial of service (CPU consumption) via a crafted bitmap (BMP) file that triggers a large number of calculations and checks.

Action-Not Available
Vendor-n/aOpera
Product-opera_browsern/a
CWE ID-CWE-189
Not Available
CWE ID-CWE-399
Not Available
CVE-2007-3642
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.06% / 83.16%
||
7 Day CHG~0.00%
Published-10 Jul, 2007 | 01:00
Updated-07 Aug, 2024 | 14:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The decode_choice function in net/netfilter/nf_conntrack_h323_asn1.c in the Linux kernel before 2.6.20.15, 2.6.21.x before 2.6.21.6, and before 2.6.22 allows remote attackers to cause a denial of service (crash) via an encoded, out-of-range index value for a choice field, which triggers a NULL pointer dereference.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-189
Not Available
CVE-2006-4517
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.99% / 82.87%
||
7 Day CHG~0.00%
Published-01 Nov, 2006 | 15:00
Updated-07 Aug, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Novell iManager 2.5 and 2.0.2 allows remote attackers to cause a denial of service (crash) in the Tomcat server via a long TREE parameter in an HTTP POST, which triggers a NULL pointer dereference.

Action-Not Available
Vendor-n/aNovell
Product-imanagern/a
CWE ID-CWE-189
Not Available
CWE ID-CWE-399
Not Available
CVE-2008-0387
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-59.91% / 98.19%
||
7 Day CHG~0.00%
Published-29 Jan, 2008 | 01:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code via crafted (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, and (6) op_start_send_and_receive XDR requests, which triggers memory corruption.

Action-Not Available
Vendor-firebirdsqln/a
Product-firebirdn/a
CWE ID-CWE-189
Not Available
CVE-2008-1267
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.68% / 70.61%
||
7 Day CHG~0.00%
Published-10 Mar, 2008 | 17:00
Updated-07 Aug, 2024 | 08:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Siemens SpeedStream 6520 router allows remote attackers to cause a denial of service (web interface crash) via an HTTP request to basehelp_English.htm with a large integer in the Content-Length field.

Action-Not Available
Vendor-n/aSiemens AG
Product-speedstream_6520n/a
CWE ID-CWE-189
Not Available
CVE-2007-6276
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-14.00% / 94.07%
||
7 Day CHG~0.00%
Published-07 Dec, 2007 | 11:00
Updated-07 Aug, 2024 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The accept_connections function in the virtual private network daemon (vpnd) in Apple Mac OS X 10.5 before 10.5.4 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted load balancing packet to UDP port 4112.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CWE ID-CWE-189
Not Available
CVE-2007-5558
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.70% / 81.50%
||
7 Day CHG~0.00%
Published-18 Oct, 2007 | 20:00
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the LG Mobile handset allows remote attackers to cause a denial of service (reboot) via a crafted HTTP packet. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.

Action-Not Available
Vendor-lg_electronicsn/a
Product-lg_mobile_handsetn/a
CWE ID-CWE-189
Not Available
CVE-2007-4347
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-7.8||HIGH
EPSS-1.35% / 79.30%
||
7 Day CHG~0.00%
Published-29 Nov, 2007 | 23:00
Updated-07 Aug, 2024 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in the Job Engine (bengine.exe) service in Symantec Backup Exec for Windows Servers (BEWS) 11d build 11.0.7170 and 11.0.6.6235 allow remote attackers to cause a denial of service (CPU and memory consumption) via a crafted packet to port 5633/tcp, which triggers an infinite loop.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-backupexec_system_recoveryn/a
CWE ID-CWE-189
Not Available
CVE-2008-3526
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-1.91% / 82.52%
||
7 Day CHG~0.00%
Published-27 Aug, 2008 | 20:00
Updated-07 Aug, 2024 | 09:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-189
Not Available
CVE-2008-1338
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.57% / 80.76%
||
7 Day CHG~0.00%
Published-14 Mar, 2008 | 20:00
Updated-07 Aug, 2024 | 08:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Perforce service (p4s.exe) in Perforce Server 2007.3/143793 and earlier allows remote attackers to cause a denial of service (daemon crash) via a server-DiffFile command with an integer value within a certain range, which causes a loop until all memory is exhausted.

Action-Not Available
Vendor-n/aPerforce Software, Inc.
Product-perforce_servern/a
CWE ID-CWE-189
Not Available
Details not found