ID CVE-2010-2448
Summary znc.cpp in ZNC before 0.092 allows remote authenticated users to cause a denial of service (crash) by requesting traffic statistics when there is an active unauthenticated connection, which triggers a NULL pointer dereference, as demonstrated using (1) a traffic link in the web administration pages or (2) the traffic command in the /znc shell. Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
References
Vulnerable Configurations
  • cpe:2.3:a:znc:znc:0.034:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.034:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.041:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.041:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.043:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.043:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.044:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.044:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.045:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.045:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.047:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.047:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.050:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.050:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.052:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.052:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.054:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.054:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.056:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.056:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.058:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.058:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.060:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.060:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.062:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.062:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.064:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.064:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.066:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.066:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.068:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.068:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.070:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.070:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.072:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.072:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.074:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.074:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.076:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.076:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.078:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.078:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.080:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.080:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.023:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.023:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.025:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.025:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.027:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.027:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.028:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.028:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.029:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.029:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.030:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.030:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.033:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.033:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.035:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.035:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.036:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.036:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.037:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.037:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.038:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.038:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.039:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.039:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.040:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.040:*:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.054:-:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.054:-:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.054:rc1:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.054:rc1:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.054:rc2:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.054:rc2:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.054:rc3:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.054:rc3:*:*:*:*:*:*
  • cpe:2.3:a:znc:znc:0.090:*:*:*:*:*:*:*
    cpe:2.3:a:znc:znc:0.090:*:*:*:*:*:*:*
CVSS
Base: 3.5 (as of 12-07-2010 - 17:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:S/C:N/I:N/A:P
refmap via4
bid 40982
confirm
debian DSA-2069
fedora
  • FEDORA-2010-10042
  • FEDORA-2010-10078
  • FEDORA-2010-10082
misc http://znc.svn.sourceforge.net/viewvc/znc/trunk/znc.cpp?r1=2025&r2=2026&pathrev=2026
secunia 40523
vupen ADV-2010-1775
Last major update 12-07-2010 - 17:30
Published 12-07-2010 - 17:30
Last modified 12-07-2010 - 17:30
Back to Top