All the vulnerabilites related to posadis - posadis
var-200412-0018
Vulnerability from variot
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. [CERT/CC VU#887766 See also ] DNS A vulnerability in the protocol implementation has been identified. Depending on the implementation, between servers Query - response A storm may occur. Also, localhost UDP 53 Port is From If a query with is sent, the server may continue to respond to the server itself and resources may be exhausted.Denial of service (denial-of-service, DoS) You can be attacked. Multiple DNS vendors are reported susceptible to a denial of service vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0018", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "delegate", "scope": "eq", "trust": 1.9, "vendor": "delegate", "version": "8.9.5" }, { "model": "wingate", "scope": "eq", "trust": 1.3, "vendor": "qbik", "version": "4.0.1" }, { "model": "wingate", "scope": "eq", "trust": 1.3, "vendor": "qbik", "version": "3.0" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.60.1" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.60.0" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.9" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.8" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.7" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.6" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.5" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.4" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.8.05" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.31" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.30" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.29" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.28" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.10" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.9" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.8" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.7" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.6" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.5" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.4" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.3" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.2" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.1" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.4" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.3" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.2" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.1" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.4" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.3" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.2" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.5.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.4.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.3.4" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.3.3" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.9.11" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.2" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.7.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.7.0" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "raidendnsd", "scope": "eq", "trust": 1.0, "vendor": "team johnlong", "version": "*" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2460 network dvr", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.0" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "posadis", "scope": "eq", "trust": 1.0, "vendor": "posadis", "version": "m5pre2" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.10.0" }, { "model": "2400 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.11" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.01" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.7" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.03" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "dns server", "scope": "eq", "trust": 1.0, "vendor": "pliant", "version": "*" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "4.1_beta_a" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.02" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.9" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2400 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.6" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.8" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "2401 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "posadis", "scope": "eq", "trust": 1.0, "vendor": "posadis", "version": "m5pre1" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0.1_build_995" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0.1_build_993" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.33" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.33" }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null }, { "model": "johnlong raidendnsd", "scope": null, "trust": 0.3, "vendor": "team", "version": null }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.1995" }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.1993" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.0" }, { "model": "wingate beta a", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "4.1" }, { "model": "m5pre2", "scope": null, "trust": 0.3, "vendor": "posadis", "version": null }, { "model": "m5pre1", "scope": null, "trust": 0.3, "vendor": "posadis", "version": null }, { "model": "dns server", "scope": null, "trust": 0.3, "vendor": "pliant", "version": null }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.10.0" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.9x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.8x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.7x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.6x" }, { "model": "communications digital video recorder", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24603.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.33" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2401+3.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2400+3.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2400+3.11" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.33" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.03" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.02" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.01" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.0" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.31005" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.21001" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.21000" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.5" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.4" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.3" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.2" }, { "model": "quickdns server", "scope": "ne", "trust": 0.3, "vendor": "men mice", "version": "3.5.2" }, { "model": "quickdns server", "scope": "ne", "trust": 0.3, "vendor": "men mice", "version": "2.2.3" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "1.0.23" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.9.01" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.9.00" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.8.99" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.6" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.0" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.6" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.4" }, { "model": "bind beta", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.3" }, { "model": "bind p7", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p6", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p5", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p4", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.11" }, { "model": "bind ow2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.10" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.10" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.9" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.8" }, { "model": "bind -t1b", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.6" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.5" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.11.0" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.4" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.3" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.2" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.1" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.17.1" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.17" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.16" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.15" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.14" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.13" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.12" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.11" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.9.6" }, { "model": "communications digital video recorder", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "24603.13" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "24202.42" }, { "model": "communications video server", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "2401+3.13" }, { "model": "communications video server", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "2400+3.13" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21202.42" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21102.42" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21002.42" } ], "sources": [ { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0789" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roy Arends and Jakob Schlyter are credited on the NISCC advisory. The original discoverer of this vulnerability is unknown at this time.", "sources": [ { "db": "BID", "id": "11642" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.9 }, "cve": "CVE-2004-0789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2004-0789", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-9219", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0789", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200412-718", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-9219", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. [CERT/CC VU#887766 See also ] DNS A vulnerability in the protocol implementation has been identified. Depending on the implementation, between servers Query - response A storm may occur. Also, localhost UDP 53 Port is From If a query with is sent, the server may continue to respond to the server itself and resources may be exhausted.Denial of service (denial-of-service, DoS) You can be attacked. Multiple DNS vendors are reported susceptible to a denial of service vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "BID", "id": "11642" }, { "db": "VULHUB", "id": "VHN-9219" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0789", "trust": 2.8 }, { "db": "BID", "id": "11642", "trust": 1.4 }, { "db": "SECUNIA", "id": "13145", "trust": 1.1 }, { "db": "SECTRACK", "id": "1012157", "trust": 1.1 }, { "db": "XF", "id": "17996", "trust": 0.8 }, { "db": "XF", "id": "17997", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000608", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200412-718", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-9219", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "id": "VAR-200412-0018", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9219" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:13:45.102000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "http://www.securityfocus.com/bid/11642" }, { "trust": 1.1, "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "trust": 1.1, "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "trust": 1.1, "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "trust": 1.1, "url": "http://securitytracker.com/id?1012157" }, { "trust": 1.1, "url": "http://secunia.com/advisories/13145" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0789" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/17997" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/17996" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-758884/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2004-0789" }, { "trust": 0.3, "url": "http://www.se.axis.com/techsup/cdsrv/storpoint_cd/index.html" }, { "trust": 0.3, "url": "http://www.delegate.org/delegate/" }, { "trust": 0.3, "url": "http://www.delegate.org/mail-lists/delegate-en/2753" }, { "trust": 0.3, "url": "http://www.maradns.org/" }, { "trust": 0.3, "url": "http://mydns.bboy.net/" }, { "trust": 0.3, "url": "http://mydns.bboy.net/download/changelog.html" }, { "trust": 0.3, "url": "http://www.axis.com/products/camera_servers/index.htm" }, { "trust": 0.3, "url": "http://www.uniras.gov.uk/vuls/2004/758884/index.htm" }, { "trust": 0.3, "url": "http://pliant.cx/pliant/protocol/dns/" }, { "trust": 0.3, "url": "http://posadis.sourceforge.net/" }, { "trust": 0.3, "url": "http://www.posadis.org/security/pos_adv_006.txt" }, { "trust": 0.3, "url": "http://wingate.deerfield.com" }, { "trust": 0.3, "url": "/archive/1/381612" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-31T00:00:00", "db": "VULHUB", "id": "VHN-9219" }, { "date": "2004-11-09T00:00:00", "db": "BID", "id": "11642" }, { "date": "2009-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "date": "2004-12-31T05:00:00", "db": "NVD", "id": "CVE-2004-0789" }, { "date": "2004-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9219" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11642" }, { "date": "2009-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "date": "2017-07-11T01:30:28.667000", "db": "NVD", "id": "CVE-2004-0789" }, { "date": "2006-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DNS Vulnerability in protocol implementation", "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000608" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "11642" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.9 } }
var-200402-0070
Vulnerability from variot
mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials. Patches have been released for the Apache mod_digest module to include digest replay protection. The module reportedly did not adequately verify client-supplied nonces against the server issued nonce. This could permit a remote attacker to replay the response of another website or section of the same website under some circumstances. It should be noted that this issue does not exist in mod_auth_digest module. Apache is a popular WEB server program. A remote attacker could exploit this vulnerability to forge responses from other sites. This vulnerability only occurs when the username and password of the user on the fake station and the server are the same, and the actual name is also the same, but this situation is relatively rare
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200402-0070", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "solaris", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "9.0" }, { "model": "solaris", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "8.0" }, { "model": "openbsd", "scope": "eq", "trust": 1.3, "vendor": "openbsd", "version": "3.5" }, { "model": "openbsd", "scope": "eq", "trust": 1.3, "vendor": "openbsd", "version": "3.4" }, { "model": "http server", "scope": "eq", "trust": 1.3, "vendor": "ibm", "version": "1.3.19" }, { "model": "communication manager", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "2.0.1" }, { "model": "communication manager", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "2.0" }, { "model": "communication manager", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "1.3.1" }, { "model": "communication manager", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "1.1" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.18" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.7" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.25" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.12" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.23" }, { "model": "apache mod digest apple", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "2.0" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.9" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.19" }, { "model": "virtualvault", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.28" }, { "model": "openserver", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": "5.0.7" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.27" }, { "model": "openbsd", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "current" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.3" }, { "model": "network routing", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "webproxy", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.02.10" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.6" }, { "model": "mn100", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "1.1" }, { "model": "virtualvault", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "4.7" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.14" }, { "model": "intuity audix lx", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.11" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.17" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "5.8" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.4" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.29" }, { "model": "openserver", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": "5.0.6" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.20" }, { "model": "webproxy", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.02.00" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.22" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.1" }, { "model": "virtualvault", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "4.5" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.26" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.24" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "stronghold", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "-current", "scope": null, "trust": 0.3, "vendor": "openbsd", "version": null }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network routing", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "mn100", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mod digest apple", "scope": null, "trust": 0.3, "vendor": "apple", "version": null }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.29" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.28" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.27" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.26" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.25" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.24" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.23" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.22" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.20" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.19" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.18" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.17" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.14" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.12" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.11" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.9" }, { "model": "-dev", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.7" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.6" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.4" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.3" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.1" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "1.3.31" }, { "model": "apache", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "1.3.31" } ], "sources": [ { "db": "BID", "id": "9571" }, { "db": "NVD", "id": "CVE-2004-1082" }, { "db": "CNNVD", "id": "CNNVD-200402-019" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.7:*:dev:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:virtualvault:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:virtualvault:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:communication_manager:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:communication_manager:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:webproxy:a.02.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:http_server:1.3.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:apache_mod_digest_apple:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:communication_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:virtualvault:4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:webproxy:a.02.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:communication_manager:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix_lx:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:avaya:network_routing:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:current:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1082" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dirk-Willem van Gulik\nOpenPKG\u203b openpkg@openpkg.org", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-019" } ], "trust": 0.6 }, "cve": "CVE-2004-1082", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9512", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-1082", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200402-019", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9512", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9512" }, { "db": "NVD", "id": "CVE-2004-1082" }, { "db": "CNNVD", "id": "CNNVD-200402-019" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials. Patches have been released for the Apache mod_digest module to include digest replay protection. The module reportedly did not adequately verify client-supplied nonces against the server issued nonce. This could permit a remote attacker to replay the response of another website or section of the same website under some circumstances. \nIt should be noted that this issue does not exist in mod_auth_digest module. Apache is a popular WEB server program. A remote attacker could exploit this vulnerability to forge responses from other sites. This vulnerability only occurs when the username and password of the user on the fake station and the server are the same, and the actual name is also the same, but this situation is relatively rare", "sources": [ { "db": "NVD", "id": "CVE-2004-1082" }, { "db": "BID", "id": "9571" }, { "db": "VULHUB", "id": "VHN-9512" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "9571", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-1082", "trust": 2.0 }, { "db": "SECTRACK", "id": "1012414", "trust": 1.7 }, { "db": "XF", "id": "18347", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2004-12-02", "trust": 0.6 }, { "db": "CIAC", "id": "P-049", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200402-019", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-9512", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9512" }, { "db": "BID", "id": "9571" }, { "db": "NVD", "id": "CVE-2004-1082" }, { "db": "CNNVD", "id": "CNNVD-200402-019" } ] }, "id": "VAR-200402-0070", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9512" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:45:21.940000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1082" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2004/dec/msg00000.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/9571" }, { "trust": 1.7, "url": "http://www.ciac.org/ciac/bulletins/p-049.shtml" }, { "trust": 1.7, "url": "http://www.securitytracker.com/alerts/2004/dec/1012414.html" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18347" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/18347" }, { "trust": 0.3, "url": "http://www.mail-archive.com/dev@httpd.apache.org/msg19005.html" }, { "trust": 0.3, "url": "http://httpd.apache.org/" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-010_rhsa-2004-600.pdf" }, { "trust": 0.3, "url": "http://www.openbsd.org/errata.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-600.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-816.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57628" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9512" }, { "db": "BID", "id": "9571" }, { "db": "NVD", "id": "CVE-2004-1082" }, { "db": "CNNVD", "id": "CNNVD-200402-019" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9512" }, { "db": "BID", "id": "9571" }, { "db": "NVD", "id": "CVE-2004-1082" }, { "db": "CNNVD", "id": "CNNVD-200402-019" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-02-03T00:00:00", "db": "VULHUB", "id": "VHN-9512" }, { "date": "2004-02-03T00:00:00", "db": "BID", "id": "9571" }, { "date": "2004-02-03T05:00:00", "db": "NVD", "id": "CVE-2004-1082" }, { "date": "2003-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200402-019" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-9512" }, { "date": "2009-07-12T02:06:00", "db": "BID", "id": "9571" }, { "date": "2018-10-30T16:25:37.090000", "db": "NVD", "id": "CVE-2004-1082" }, { "date": "2006-08-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200402-019" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-019" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache mod_digest Customer supply Nonce Confirmation vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-019" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-019" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "matchCriteriaId": "530D1254-DC0A-4A7C-9520-D0F45B9AF278", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in log_print() function of Posadis DNS server before version m5pre2 allows local users and possibly remote attackers to execute arbitrary code via format strings that are inserted into logging messages." } ], "id": "CVE-2002-0501", "lastModified": "2024-11-20T23:39:14.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-08-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://online.securityfocus.com/archive/1/264450" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8653.php" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/3516" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://online.securityfocus.com/archive/1/264450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8653.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/3516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4378" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9180C95-FF6F-4A0C-9DE0-DFF6D8387698", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68FA1404-9FA2-4379-96BC-6D7970C0EAA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EABEE7AB-7C45-473E-9873-0423F2249F96", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A1F66F57-6AEB-4E3C-B148-BC7D11E1EBEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "611AD3E5-708F-46BB-B21D-09598E1C4771", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD59AEEB-D524-4337-8962-B29863CBC889", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F15245AF-B9B6-4D46-A901-A781FC0BAF24", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C7A3E1EB-89A5-4326-8977-9B462065C39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BD607D2-2B07-474B-A855-2C3319B42CED", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE4B4665-84C4-4129-9916-ABAC61B81FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "4131A4A5-5D67-4522-9A6E-E708815B5B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8C30DD0-C957-44BA-B44C-7B424E664B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC2E24A5-A864-4F42-A053-2FDA9D09A4B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "0993A56D-3A68-464A-B580-BE2EC3846F3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "1EF6186E-90D1-4D22-A469-0E955D5F1EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7323E750-C596-46FC-AA85-9271CC9C2CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F7EA693-9873-4201-B66D-D0AC08E7F560", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "022F8E8E-F6A1-4782-82D0-686E6FADCF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9E269F0-8CFD-45DB-AF82-F9F57EDD0D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "752CC26D-33D2-43F1-A43B-E101553895C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "317134CF-981A-44CC-B068-BA762AED5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A906D87C-5557-4FC0-BBF3-7169EF35DEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CC34DC23-117A-403E-9C87-79B1C512A5DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BFE559DF-3874-42E7-BB5B-8968E52D7A04", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "11068A01-20FB-4039-8919-85CF93F0FF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9435E392-AE02-48A8-9A2D-3D1593DA3DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3B3D730-15C0-494A-A0B6-231C9F370A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*", "matchCriteriaId": "A917E7C9-BC1A-4D62-9A89-9D73A748D926", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*", "matchCriteriaId": "E0A01622-5254-4B3B-9412-771BE7400FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A5A98-3544-4A95-8436-0DF013B22CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*", "matchCriteriaId": "BECF00EC-A188-4B7F-BA51-3AAC3B4195B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*", "matchCriteriaId": "AD2370B5-681D-469F-B07C-B9212A975C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA13B142-71F9-475E-A28A-DDE94BE0E7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "matchCriteriaId": "1930E3DE-67BE-41F2-B8E3-BA8E18762C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C7DD08-C349-4687-8FAF-CCD211A9C166", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "matchCriteriaId": "981611C8-B957-428B-9500-37C60AE0E7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "matchCriteriaId": "D34782A9-4CCB-45AD-BA23-EE98EE218B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D2517-4EAF-4DB9-B0EE-51F65671D45F", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*", "matchCriteriaId": "0FA40391-39D5-4CB7-BB8E-048C4ECBC3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "135BFFE3-FF18-4462-9D19-2DF986E947DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD907CE8-E0CD-46AA-A9E4-3D0FA3939DAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "matchCriteriaId": "530D1254-DC0A-4A7C-9520-D0F45B9AF278", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*", "matchCriteriaId": "5C3BF047-0339-4064-9B3B-68E96F1AB1B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C7BC4C8-FB7B-4A88-B97B-984D9AA8EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C1D98E1-EBE1-4697-906F-E29C91D9074D", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*", "matchCriteriaId": "8AB1D7C0-E484-4441-AA68-FBA5A3309547", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3F0670C-C07E-4A84-952B-88200D2D9B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*", "matchCriteriaId": "82CD8E2B-37BF-4989-ABF3-9EC8E6F1C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*", "matchCriteriaId": "2CCFB397-9F5F-42F8-ABB3-9700F100D43D", "vulnerable": true }, { "criteria": "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4967B8F-D25F-4B55-842E-0C7819EDA88A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "37F0C4C8-E648-4486-BFE3-23333FCFF118", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "56647964-82B3-4A7A-BE0D-C252654F8CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "C7B83A6F-1996-49B7-BA76-98B83548F289", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "E021E51E-EA28-4E61-A08A-A590984A483E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "94ABCB8C-8EED-4635-BA54-735CA12A1F64", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "38C70CE1-0116-4C91-AB59-0C0D9F17099B", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "44B1C47A-938B-4F9B-B4B5-88B8622DC965", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "E890E332-7A3B-4B6A-91B3-7FEFAF5DBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "4830EAF7-9504-4090-8DDD-6CC6658ABFD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "7E26AD96-7BA4-4722-B059-6444FFC2E6D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "E06E7446-34EC-428A-82EE-2E24F2908C97", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "8D4996E0-097B-4B79-8A1C-CE55F94B8D29", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0200586F-7F71-47F6-8D2E-F06E1BF418E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "F5764F35-7F21-40D0-A3FF-8EEF97F7931D", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "6BE3CF46-91CC-4AFD-B178-48AE90E0E339", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "D79A54BC-789D-4ED2-B3BC-C42959D7FFF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "79A8A437-5AF7-448E-9AF8-D8FBA481CFE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "5663D3D1-5962-4C43-B689-089EAFE25FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "34EDC537-0EFF-46EA-8368-A690480E5D6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "39798220-4621-4C5D-B6A7-6639D02E0C07", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "05EF66A4-F7BB-40C3-9CBF-5DB8715780C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "9DCA7249-7F8F-4A2D-B98F-6AA0ECF17D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "0E942419-3272-4267-AF23-4B6071D71277", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "3848A541-4F14-4E3B-99EE-B7C5A886C541", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "34E980E1-62B8-4E37-AE9D-DFE033053620", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "730E6E09-C0C8-4F8A-BE07-BFED00FC1235", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "81100E37-1B99-4317-829F-B4A2278FA323", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "10321B16-1675-4609-8267-3971A9062AF0", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "35F0E1BA-D05F-41CB-ACD9-035A6DF4735E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "1DD73320-38DA-4606-9CEA-F0C9D5A3215F", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B8374F1E-06BC-4A9E-8666-336AACC1F5BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3F905-8AC0-42A3-AC63-BA61AE6619AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "46E11270-65DE-4C07-A103-66217691069E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "7B93D2AD-FA36-4A6C-AC52-6FD0F3AE6A80", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "D109CF38-0F5F-4A20-8A4A-DBE14D7826CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "EA6E6FEA-9D2E-4ACD-8C3A-98DA4EB1C994", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "10B4A828-33F4-4FB7-9637-3C761A73AEF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "41CB517F-BDC9-40D0-AB0D-2DFC7669E8F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ], "id": "CVE-2004-0789", "lastModified": "2024-11-20T23:49:24.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13145" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1012157" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11642" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1012157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "matchCriteriaId": "1930E3DE-67BE-41F2-B8E3-BA8E18762C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C7DD08-C349-4687-8FAF-CCD211A9C166", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "matchCriteriaId": "981611C8-B957-428B-9500-37C60AE0E7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "matchCriteriaId": "D34782A9-4CCB-45AD-BA23-EE98EE218B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D2517-4EAF-4DB9-B0EE-51F65671D45F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Posadis 0.50.4 through 0.50.8 allows remote attackers to cause a denial of service (crash) via a DNS message without a question section, which triggers null dereference." } ], "id": "CVE-2003-1441", "lastModified": "2024-11-20T23:47:09.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/8018" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/3522" }, { "source": "cve@mitre.org", "url": "http://www.posadis.org/advisories/pos_adv_003.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6799" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/8018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/3522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.posadis.org/advisories/pos_adv_003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6799" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2002-0501
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/3516 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/4378 | vdb-entry, x_refsource_BID | |
http://sourceforge.net/forum/forum.php?forum_id=165094 | x_refsource_CONFIRM | |
http://www.iss.net/security_center/static/8653.php | vdb-entry, x_refsource_XF | |
http://online.securityfocus.com/archive/1/264450 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:49:28.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3516", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3516" }, { "name": "4378", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4378" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "name": "posadis-logging-format-string(8653)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8653.php" }, { "name": "20020327 Format String Bug in Posadis DNS Server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/264450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in log_print() function of Posadis DNS server before version m5pre2 allows local users and possibly remote attackers to execute arbitrary code via format strings that are inserted into logging messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3516", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3516" }, { "name": "4378", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4378" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "name": "posadis-logging-format-string(8653)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8653.php" }, { "name": "20020327 Format String Bug in Posadis DNS Server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/264450" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in log_print() function of Posadis DNS server before version m5pre2 allows local users and possibly remote attackers to execute arbitrary code via format strings that are inserted into logging messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3516", "refsource": "OSVDB", "url": "http://www.osvdb.org/3516" }, { "name": "4378", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4378" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=165094", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "name": "posadis-logging-format-string(8653)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8653.php" }, { "name": "20020327 Format String Bug in Posadis DNS Server", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/264450" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0501", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:49:28.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0789
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/13145 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1012157 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/11642 | vdb-entry, x_refsource_BID | |
http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en | x_refsource_MISC | |
http://www.posadis.org/advisories/pos_adv_006.txt | x_refsource_CONFIRM | |
http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:46.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "13145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11642" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "13145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11642" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "13145", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11642" }, { "name": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "name": "http://www.posadis.org/advisories/pos_adv_006.txt", "refsource": "CONFIRM", "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "name": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0789", "datePublished": "2005-09-01T04:00:00", "dateReserved": "2004-08-17T00:00:00", "dateUpdated": "2024-08-08T00:31:46.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1441
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/11285 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/8018 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/6799 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/3522 | vdb-entry, x_refsource_OSVDB | |
http://www.posadis.org/advisories/pos_adv_003.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "posadis-dns-packet-dos(11285)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" }, { "name": "8018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8018" }, { "name": "6799", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6799" }, { "name": "3522", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3522" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.posadis.org/advisories/pos_adv_003.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Posadis 0.50.4 through 0.50.8 allows remote attackers to cause a denial of service (crash) via a DNS message without a question section, which triggers null dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "posadis-dns-packet-dos(11285)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" }, { "name": "8018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8018" }, { "name": "6799", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6799" }, { "name": "3522", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3522" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.posadis.org/advisories/pos_adv_003.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1441", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Posadis 0.50.4 through 0.50.8 allows remote attackers to cause a denial of service (crash) via a DNS message without a question section, which triggers null dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "posadis-dns-packet-dos(11285)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" }, { "name": "8018", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8018" }, { "name": "6799", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6799" }, { "name": "3522", "refsource": "OSVDB", "url": "http://www.osvdb.org/3522" }, { "name": "http://www.posadis.org/advisories/pos_adv_003.txt", "refsource": "CONFIRM", "url": "http://www.posadis.org/advisories/pos_adv_003.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1441", "datePublished": "2007-10-23T01:00:00", "dateReserved": "2007-10-22T00:00:00", "dateUpdated": "2024-08-08T02:28:03.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }