FKIE_CVE-2008-1996

Vulnerability from fkie_nvd - Published: 2008-04-28 20:05 - Updated: 2025-04-09 00:30
Severity ?
Summary
licq before 1.3.6 allows remote attackers to cause a denial of service (file-descriptor exhaustion and application crash) via a large number of connections.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
cve@mitre.orghttp://seclists.org/bugtraq/2008/Apr/0100.html
cve@mitre.orghttp://secunia.com/advisories/30055
cve@mitre.orghttp://secunia.com/advisories/30236
cve@mitre.orghttp://securityreason.com/securityalert/3851
cve@mitre.orghttp://www.licq.org/changeset/6146
cve@mitre.orghttp://www.licq.org/ticket/1623
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:159
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/04/25/1
cve@mitre.orghttp://www.securityfocus.com/archive/1/490563Exploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/490717
cve@mitre.orghttp://www.securityfocus.com/bid/28679
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1446/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41732
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/bugtraq/2008/Apr/0100.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30055
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30236
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3851
af854a3a-2127-422b-91ae-364da2661108http://www.licq.org/changeset/6146
af854a3a-2127-422b-91ae-364da2661108http://www.licq.org/ticket/1623
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:159
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/04/25/1
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/490563Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/490717
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28679
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1446/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41732
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html
Impacted products
Vendor Product Version
licq licq 0.61
licq licq 0.71
licq licq 0.75
licq licq 0.75.1
licq licq 0.75.2
licq licq 0.75.3
licq licq 0.75.3a
licq licq 0.75_991219
licq licq 0.76
licq licq 0.80
licq licq 0.81
licq licq 0.84a
licq licq 0.84b
licq licq 0.85
licq licq 1.0
licq licq 1.0.1
licq licq 1.0.2
licq licq 1.0.3
licq licq 1.0.4
licq licq 1.2
licq licq 1.2.3
licq licq 1.2.4
licq licq 1.2.6
licq licq 1.2.7
licq licq 1.3.0
licq licq 1.3.0_pre
licq licq 1.3.2
licq licq 1.3.2_rc
licq licq 1.3.4
licq licq 1.3.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:licq:licq:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF5C07FE-E369-45A5-BAD8-D12B6CCA3AE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3504C4C-B292-4DF7-8AB2-B012667546DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "99DF4EC3-7CD1-48C1-921E-0644444A0565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B31462B-CF61-40C9-98BC-4FE6FBE9049E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "211009EF-2C6C-4463-B3D2-C7B406A303AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531894C-321C-4E91-A3DB-CDD5D38FDF91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AECEB0-3D0D-4C64-A928-0E52AA4F4F0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75_991219:*:*:*:*:*:*:*",
              "matchCriteriaId": "8615B703-A767-4F1D-8B56-8CB7BBCDF2BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "5632AE68-5842-4D3E-93B0-266345697D60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B64A9DE-78EA-457E-A4BD-4446A8C096D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE6AF6A-ABDA-401A-B5DF-343AB8A656F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.84a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD25CC42-5156-4E43-8EBF-CB9804333715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.84b:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C55845B-A772-4B54-B794-0D4EECEC74CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D66C44-8AA4-4874-BD74-E959CEC26F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA200C7-5602-418C-B1B3-2825680BEA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD313EF-B6BA-41C1-96F0-645D872242FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E40E03-411D-4EFA-9620-574BACE357B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C3EEA7-56B7-4F20-8701-8D26EF853697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "47334B83-4DC7-4EDD-B10D-3A8A4D0D81C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B06B0DE-4303-4F19-868B-821939F37A5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "19922E12-CC67-4177-B4FB-CD958ABE9E58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "555C61F1-1518-480D-A5C7-03DFA2680CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5847F57C-E596-42D6-AFCA-88DA1AADF040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1825DF7D-12D5-4467-8F2A-67DCD12F83A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3A0651-CDD9-4E72-BE33-F6446DCE7387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.0_pre:*:*:*:*:*:*:*",
              "matchCriteriaId": "E80CB706-CAE3-4E9A-96C5-8A4E147736F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE97E63-2913-4B4E-A9E6-22FCA297FA17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.2_rc:*:*:*:*:*:*:*",
              "matchCriteriaId": "966D7E45-582F-47F5-8183-E924D442AC71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA6A213-E65A-4B63-B745-CDED7A1499D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2A195F8-A150-4560-8528-17804D284A0A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "licq before 1.3.6 allows remote attackers to cause a denial of service (file-descriptor exhaustion and application crash) via a large number of connections."
    },
    {
      "lang": "es",
      "value": "licq antes de 1.3.6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de descriptores de ficheros y ca\u00edda de la aplicaci\u00f3n) mediante gran n\u00famero de conexiones."
    }
  ],
  "evaluatorComment": "More information located: http://www.securityfocus.com/bid/28679/info",
  "id": "CVE-2008-1996",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-04-28T20:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/bugtraq/2008/Apr/0100.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30055"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30236"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3851"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.licq.org/changeset/6146"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.licq.org/ticket/1623"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:159"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/04/25/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/archive/1/490563"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/490717"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28679"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1446/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41732"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/bugtraq/2008/Apr/0100.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.licq.org/changeset/6146"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.licq.org/ticket/1623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/04/25/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/archive/1/490563"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/490717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28679"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1446/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…