Vulnerabilites related to posadis - posadis
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "matchCriteriaId": "530D1254-DC0A-4A7C-9520-D0F45B9AF278", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in log_print() function of Posadis DNS server before version m5pre2 allows local users and possibly remote attackers to execute arbitrary code via format strings that are inserted into logging messages." } ], "id": "CVE-2002-0501", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-08-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://online.securityfocus.com/archive/1/264450" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8653.php" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/3516" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://online.securityfocus.com/archive/1/264450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8653.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/3516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4378" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "matchCriteriaId": "1930E3DE-67BE-41F2-B8E3-BA8E18762C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C7DD08-C349-4687-8FAF-CCD211A9C166", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "matchCriteriaId": "981611C8-B957-428B-9500-37C60AE0E7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "matchCriteriaId": "D34782A9-4CCB-45AD-BA23-EE98EE218B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D2517-4EAF-4DB9-B0EE-51F65671D45F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Posadis 0.50.4 through 0.50.8 allows remote attackers to cause a denial of service (crash) via a DNS message without a question section, which triggers null dereference." } ], "id": "CVE-2003-1441", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/8018" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/3522" }, { "source": "cve@mitre.org", "url": "http://www.posadis.org/advisories/pos_adv_003.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6799" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/8018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/3522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.posadis.org/advisories/pos_adv_003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6799" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9180C95-FF6F-4A0C-9DE0-DFF6D8387698", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68FA1404-9FA2-4379-96BC-6D7970C0EAA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EABEE7AB-7C45-473E-9873-0423F2249F96", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A1F66F57-6AEB-4E3C-B148-BC7D11E1EBEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "611AD3E5-708F-46BB-B21D-09598E1C4771", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD59AEEB-D524-4337-8962-B29863CBC889", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F15245AF-B9B6-4D46-A901-A781FC0BAF24", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C7A3E1EB-89A5-4326-8977-9B462065C39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BD607D2-2B07-474B-A855-2C3319B42CED", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE4B4665-84C4-4129-9916-ABAC61B81FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "4131A4A5-5D67-4522-9A6E-E708815B5B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8C30DD0-C957-44BA-B44C-7B424E664B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC2E24A5-A864-4F42-A053-2FDA9D09A4B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "0993A56D-3A68-464A-B580-BE2EC3846F3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "1EF6186E-90D1-4D22-A469-0E955D5F1EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7323E750-C596-46FC-AA85-9271CC9C2CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F7EA693-9873-4201-B66D-D0AC08E7F560", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "022F8E8E-F6A1-4782-82D0-686E6FADCF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9E269F0-8CFD-45DB-AF82-F9F57EDD0D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "752CC26D-33D2-43F1-A43B-E101553895C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "317134CF-981A-44CC-B068-BA762AED5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A906D87C-5557-4FC0-BBF3-7169EF35DEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CC34DC23-117A-403E-9C87-79B1C512A5DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BFE559DF-3874-42E7-BB5B-8968E52D7A04", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "11068A01-20FB-4039-8919-85CF93F0FF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9435E392-AE02-48A8-9A2D-3D1593DA3DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3B3D730-15C0-494A-A0B6-231C9F370A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*", "matchCriteriaId": "A917E7C9-BC1A-4D62-9A89-9D73A748D926", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*", "matchCriteriaId": "E0A01622-5254-4B3B-9412-771BE7400FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A5A98-3544-4A95-8436-0DF013B22CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*", "matchCriteriaId": "BECF00EC-A188-4B7F-BA51-3AAC3B4195B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*", "matchCriteriaId": "AD2370B5-681D-469F-B07C-B9212A975C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA13B142-71F9-475E-A28A-DDE94BE0E7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "matchCriteriaId": "1930E3DE-67BE-41F2-B8E3-BA8E18762C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C7DD08-C349-4687-8FAF-CCD211A9C166", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "matchCriteriaId": "981611C8-B957-428B-9500-37C60AE0E7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "matchCriteriaId": "D34782A9-4CCB-45AD-BA23-EE98EE218B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D2517-4EAF-4DB9-B0EE-51F65671D45F", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*", "matchCriteriaId": "0FA40391-39D5-4CB7-BB8E-048C4ECBC3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "135BFFE3-FF18-4462-9D19-2DF986E947DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD907CE8-E0CD-46AA-A9E4-3D0FA3939DAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "matchCriteriaId": "530D1254-DC0A-4A7C-9520-D0F45B9AF278", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*", "matchCriteriaId": "5C3BF047-0339-4064-9B3B-68E96F1AB1B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C7BC4C8-FB7B-4A88-B97B-984D9AA8EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C1D98E1-EBE1-4697-906F-E29C91D9074D", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*", "matchCriteriaId": "8AB1D7C0-E484-4441-AA68-FBA5A3309547", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3F0670C-C07E-4A84-952B-88200D2D9B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*", "matchCriteriaId": "82CD8E2B-37BF-4989-ABF3-9EC8E6F1C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*", "matchCriteriaId": "2CCFB397-9F5F-42F8-ABB3-9700F100D43D", "vulnerable": true }, { "criteria": "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4967B8F-D25F-4B55-842E-0C7819EDA88A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "37F0C4C8-E648-4486-BFE3-23333FCFF118", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "56647964-82B3-4A7A-BE0D-C252654F8CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "C7B83A6F-1996-49B7-BA76-98B83548F289", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "E021E51E-EA28-4E61-A08A-A590984A483E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "94ABCB8C-8EED-4635-BA54-735CA12A1F64", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "38C70CE1-0116-4C91-AB59-0C0D9F17099B", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "44B1C47A-938B-4F9B-B4B5-88B8622DC965", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "E890E332-7A3B-4B6A-91B3-7FEFAF5DBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "4830EAF7-9504-4090-8DDD-6CC6658ABFD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "7E26AD96-7BA4-4722-B059-6444FFC2E6D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "E06E7446-34EC-428A-82EE-2E24F2908C97", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "8D4996E0-097B-4B79-8A1C-CE55F94B8D29", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0200586F-7F71-47F6-8D2E-F06E1BF418E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "F5764F35-7F21-40D0-A3FF-8EEF97F7931D", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "6BE3CF46-91CC-4AFD-B178-48AE90E0E339", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "D79A54BC-789D-4ED2-B3BC-C42959D7FFF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "79A8A437-5AF7-448E-9AF8-D8FBA481CFE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "5663D3D1-5962-4C43-B689-089EAFE25FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "34EDC537-0EFF-46EA-8368-A690480E5D6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "39798220-4621-4C5D-B6A7-6639D02E0C07", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "05EF66A4-F7BB-40C3-9CBF-5DB8715780C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "9DCA7249-7F8F-4A2D-B98F-6AA0ECF17D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "0E942419-3272-4267-AF23-4B6071D71277", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "3848A541-4F14-4E3B-99EE-B7C5A886C541", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "34E980E1-62B8-4E37-AE9D-DFE033053620", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "730E6E09-C0C8-4F8A-BE07-BFED00FC1235", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "81100E37-1B99-4317-829F-B4A2278FA323", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "10321B16-1675-4609-8267-3971A9062AF0", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "35F0E1BA-D05F-41CB-ACD9-035A6DF4735E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "1DD73320-38DA-4606-9CEA-F0C9D5A3215F", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B8374F1E-06BC-4A9E-8666-336AACC1F5BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3F905-8AC0-42A3-AC63-BA61AE6619AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "46E11270-65DE-4C07-A103-66217691069E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "7B93D2AD-FA36-4A6C-AC52-6FD0F3AE6A80", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "D109CF38-0F5F-4A20-8A4A-DBE14D7826CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "EA6E6FEA-9D2E-4ACD-8C3A-98DA4EB1C994", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "10B4A828-33F4-4FB7-9637-3C761A73AEF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "41CB517F-BDC9-40D0-AB0D-2DFC7669E8F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ], "id": "CVE-2004-0789", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13145" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1012157" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11642" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1012157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200402-0070
Vulnerability from variot
mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials. Patches have been released for the Apache mod_digest module to include digest replay protection. The module reportedly did not adequately verify client-supplied nonces against the server issued nonce. This could permit a remote attacker to replay the response of another website or section of the same website under some circumstances. It should be noted that this issue does not exist in mod_auth_digest module. Apache is a popular WEB server program. A remote attacker could exploit this vulnerability to forge responses from other sites. This vulnerability only occurs when the username and password of the user on the fake station and the server are the same, and the actual name is also the same, but this situation is relatively rare
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200402-0070", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "solaris", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "9.0" }, { "model": "solaris", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "8.0" }, { "model": "openbsd", "scope": "eq", "trust": 1.3, "vendor": "openbsd", "version": "3.5" }, { "model": "openbsd", "scope": "eq", "trust": 1.3, "vendor": "openbsd", "version": "3.4" }, { "model": "http server", "scope": "eq", "trust": 1.3, "vendor": "ibm", "version": "1.3.19" }, { "model": "communication manager", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "2.0.1" }, { "model": "communication manager", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "2.0" }, { "model": "communication manager", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "1.3.1" }, { "model": "communication manager", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "1.1" }, { "model": "openserver", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": "5.0.7" }, { "model": "intuity audix lx", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.29" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "1.1" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.11" }, { "model": "virtualvault", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "4.5" }, { "model": "webproxy", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.02.10" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.7" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.18" }, { "model": "virtualvault", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "4.7" }, { "model": "network routing", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "mn100", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "2.0" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.20" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.6" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.22" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.9" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3" }, { "model": "openserver", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": "5.0.6" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.26" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.27" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.23" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.24" }, { "model": "webproxy", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.02.00" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "5.8" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.19" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.14" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.3" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.28" }, { "model": "virtualvault", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "4.6" }, { "model": "apache mod digest apple", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.17" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.12" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.25" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.4" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "1.3.1" }, { "model": "openbsd", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "current" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "stronghold", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "-current", "scope": null, "trust": 0.3, "vendor": "openbsd", "version": null }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network routing", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "mn100", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mod digest apple", "scope": null, "trust": 0.3, "vendor": "apple", "version": null }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.29" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.28" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.27" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.26" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.25" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.24" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.23" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.22" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.20" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.19" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.18" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.17" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.14" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.12" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.11" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.9" }, { "model": "-dev", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.7" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.6" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.4" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.3" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.1" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "1.3.31" }, { "model": "apache", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "1.3.31" } ], "sources": [ { "db": "BID", "id": "9571" }, { "db": "CNNVD", "id": "CNNVD-200402-019" }, { "db": "NVD", "id": "CVE-2004-1082" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dirk-Willem van Gulik\nOpenPKG\u203b openpkg@openpkg.org", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-019" } ], "trust": 0.6 }, "cve": "CVE-2004-1082", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2004-1082", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9512", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-1082", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200402-019", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9512", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9512" }, { "db": "CNNVD", "id": "CNNVD-200402-019" }, { "db": "NVD", "id": "CVE-2004-1082" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials. Patches have been released for the Apache mod_digest module to include digest replay protection. The module reportedly did not adequately verify client-supplied nonces against the server issued nonce. This could permit a remote attacker to replay the response of another website or section of the same website under some circumstances. \nIt should be noted that this issue does not exist in mod_auth_digest module. Apache is a popular WEB server program. A remote attacker could exploit this vulnerability to forge responses from other sites. This vulnerability only occurs when the username and password of the user on the fake station and the server are the same, and the actual name is also the same, but this situation is relatively rare", "sources": [ { "db": "NVD", "id": "CVE-2004-1082" }, { "db": "BID", "id": "9571" }, { "db": "VULHUB", "id": "VHN-9512" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "9571", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-1082", "trust": 2.0 }, { "db": "SECTRACK", "id": "1012414", "trust": 1.7 }, { "db": "XF", "id": "18347", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2004-12-02", "trust": 0.6 }, { "db": "CIAC", "id": "P-049", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200402-019", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-9512", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9512" }, { "db": "BID", "id": "9571" }, { "db": "CNNVD", "id": "CNNVD-200402-019" }, { "db": "NVD", "id": "CVE-2004-1082" } ] }, "id": "VAR-200402-0070", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9512" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T12:08:30.776000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1082" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2004/dec/msg00000.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/9571" }, { "trust": 1.7, "url": "http://www.ciac.org/ciac/bulletins/p-049.shtml" }, { "trust": 1.7, "url": "http://www.securitytracker.com/alerts/2004/dec/1012414.html" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18347" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/18347" }, { "trust": 0.3, "url": "http://www.mail-archive.com/dev@httpd.apache.org/msg19005.html" }, { "trust": 0.3, "url": "http://httpd.apache.org/" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-010_rhsa-2004-600.pdf" }, { "trust": 0.3, "url": "http://www.openbsd.org/errata.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-600.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-816.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57628" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9512" }, { "db": "BID", "id": "9571" }, { "db": "CNNVD", "id": "CNNVD-200402-019" }, { "db": "NVD", "id": "CVE-2004-1082" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9512" }, { "db": "BID", "id": "9571" }, { "db": "CNNVD", "id": "CNNVD-200402-019" }, { "db": "NVD", "id": "CVE-2004-1082" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-02-03T00:00:00", "db": "VULHUB", "id": "VHN-9512" }, { "date": "2004-02-03T00:00:00", "db": "BID", "id": "9571" }, { "date": "2003-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200402-019" }, { "date": "2004-02-03T05:00:00", "db": "NVD", "id": "CVE-2004-1082" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-9512" }, { "date": "2009-07-12T02:06:00", "db": "BID", "id": "9571" }, { "date": "2006-08-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200402-019" }, { "date": "2018-10-30T16:25:37.090000", "db": "NVD", "id": "CVE-2004-1082" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-019" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache mod_digest Customer supply Nonce Confirmation vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-019" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-019" } ], "trust": 0.6 } }
var-200412-0018
Vulnerability from variot
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. [CERT/CC VU#887766 See also ] DNS A vulnerability in the protocol implementation has been identified. Depending on the implementation, between servers Query - response A storm may occur. Also, localhost UDP 53 Port is From If a query with is sent, the server may continue to respond to the server itself and resources may be exhausted.Denial of service (denial-of-service, DoS) You can be attacked. Multiple DNS vendors are reported susceptible to a denial of service vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0018", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "delegate", "scope": "eq", "trust": 1.9, "vendor": "delegate", "version": "8.9.5" }, { "model": "wingate", "scope": "eq", "trust": 1.3, "vendor": "qbik", "version": "4.0.1" }, { "model": "wingate", "scope": "eq", "trust": 1.3, "vendor": "qbik", "version": "3.0" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.60.1" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.60.0" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.9" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.8" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.7" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.6" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.5" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.4" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.8.05" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.31" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.30" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.29" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.28" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.10" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.9" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.8" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.7" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.6" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.5" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.4" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.3" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.2" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.1" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.4" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.3" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.2" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.1" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.4" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.3" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.2" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.5.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.4.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.3.4" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.3.3" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.9.11" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.2" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.7.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.7.0" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "dns server", "scope": "eq", "trust": 1.0, "vendor": "pliant", "version": "*" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.33" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.8" }, { "model": "2400 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.11" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.02" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.6" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.33" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "2400 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0.1_build_993" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.0" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.10.0" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "4.1_beta_a" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.9" }, { "model": "2460 network dvr", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.01" }, { "model": "raidendnsd", "scope": "eq", "trust": 1.0, "vendor": "team johnlong", "version": "*" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "posadis", "scope": "eq", "trust": 1.0, "vendor": "posadis", "version": "m5pre2" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.7" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.03" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "2401 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0.1_build_995" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "posadis", "scope": "eq", "trust": 1.0, "vendor": "posadis", "version": "m5pre1" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0" }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null }, { "model": "johnlong raidendnsd", "scope": null, "trust": 0.3, "vendor": "team", "version": null }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.1995" }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.1993" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.0" }, { "model": "wingate beta a", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "4.1" }, { "model": "m5pre2", "scope": null, "trust": 0.3, "vendor": "posadis", "version": null }, { "model": "m5pre1", "scope": null, "trust": 0.3, "vendor": "posadis", "version": null }, { "model": "dns server", "scope": null, "trust": 0.3, "vendor": "pliant", "version": null }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.10.0" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.9x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.8x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.7x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.6x" }, { "model": "communications digital video recorder", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24603.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.33" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2401+3.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2400+3.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2400+3.11" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.33" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.03" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.02" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.01" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.0" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.31005" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.21001" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.21000" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.5" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.4" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.3" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.2" }, { "model": "quickdns server", "scope": "ne", "trust": 0.3, "vendor": "men mice", "version": "3.5.2" }, { "model": "quickdns server", "scope": "ne", "trust": 0.3, "vendor": "men mice", "version": "2.2.3" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "1.0.23" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.9.01" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.9.00" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.8.99" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.6" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.0" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.6" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.4" }, { "model": "bind beta", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.3" }, { "model": "bind p7", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p6", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p5", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p4", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.11" }, { "model": "bind ow2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.10" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.10" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.9" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.8" }, { "model": "bind -t1b", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.6" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.5" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.11.0" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.4" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.3" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.2" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.1" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.17.1" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.17" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.16" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.15" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.14" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.13" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.12" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.11" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.9.6" }, { "model": "communications digital video recorder", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "24603.13" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "24202.42" }, { "model": "communications video server", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "2401+3.13" }, { "model": "communications video server", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "2400+3.13" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21202.42" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21102.42" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21002.42" } ], "sources": [ { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "CNNVD", "id": "CNNVD-200412-718" }, { "db": "NVD", "id": "CVE-2004-0789" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:misc:multiple_vendors", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000608" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roy Arends and Jakob Schlyter are credited on the NISCC advisory. The original discoverer of this vulnerability is unknown at this time.", "sources": [ { "db": "BID", "id": "11642" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.9 }, "cve": "CVE-2004-0789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2004-0789", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-9219", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-0789", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2004-0789", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200412-718", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-9219", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "CNNVD", "id": "CNNVD-200412-718" }, { "db": "NVD", "id": "CVE-2004-0789" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. [CERT/CC VU#887766 See also ] DNS A vulnerability in the protocol implementation has been identified. Depending on the implementation, between servers Query - response A storm may occur. Also, localhost UDP 53 Port is From If a query with is sent, the server may continue to respond to the server itself and resources may be exhausted.Denial of service (denial-of-service, DoS) You can be attacked. Multiple DNS vendors are reported susceptible to a denial of service vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "BID", "id": "11642" }, { "db": "VULHUB", "id": "VHN-9219" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0789", "trust": 2.8 }, { "db": "BID", "id": "11642", "trust": 1.4 }, { "db": "SECUNIA", "id": "13145", "trust": 1.1 }, { "db": "SECTRACK", "id": "1012157", "trust": 1.1 }, { "db": "XF", "id": "17996", "trust": 0.8 }, { "db": "XF", "id": "17997", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000608", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200412-718", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-9219", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "CNNVD", "id": "CNNVD-200412-718" }, { "db": "NVD", "id": "CVE-2004-0789" } ] }, "id": "VAR-200412-0018", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9219" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:40:17.853000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "http://www.securityfocus.com/bid/11642" }, { "trust": 1.1, "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "trust": 1.1, "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "trust": 1.1, "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "trust": 1.1, "url": "http://securitytracker.com/id?1012157" }, { "trust": 1.1, "url": "http://secunia.com/advisories/13145" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0789" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/17997" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/17996" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-758884/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2004-0789" }, { "trust": 0.3, "url": "http://www.se.axis.com/techsup/cdsrv/storpoint_cd/index.html" }, { "trust": 0.3, "url": "http://www.delegate.org/delegate/" }, { "trust": 0.3, "url": "http://www.delegate.org/mail-lists/delegate-en/2753" }, { "trust": 0.3, "url": "http://www.maradns.org/" }, { "trust": 0.3, "url": "http://mydns.bboy.net/" }, { "trust": 0.3, "url": "http://mydns.bboy.net/download/changelog.html" }, { "trust": 0.3, "url": "http://www.axis.com/products/camera_servers/index.htm" }, { "trust": 0.3, "url": "http://www.uniras.gov.uk/vuls/2004/758884/index.htm" }, { "trust": 0.3, "url": "http://pliant.cx/pliant/protocol/dns/" }, { "trust": 0.3, "url": "http://posadis.sourceforge.net/" }, { "trust": 0.3, "url": "http://www.posadis.org/security/pos_adv_006.txt" }, { "trust": 0.3, "url": "http://wingate.deerfield.com" }, { "trust": 0.3, "url": "/archive/1/381612" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "CNNVD", "id": "CNNVD-200412-718" }, { "db": "NVD", "id": "CVE-2004-0789" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-31T00:00:00", "db": "VULHUB", "id": "VHN-9219" }, { "date": "2004-11-09T00:00:00", "db": "BID", "id": "11642" }, { "date": "2009-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "date": "2004-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-718" }, { "date": "2004-12-31T05:00:00", "db": "NVD", "id": "CVE-2004-0789" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9219" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11642" }, { "date": "2009-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "date": "2006-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-718" }, { "date": "2017-07-11T01:30:28.667000", "db": "NVD", "id": "CVE-2004-0789" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DNS Vulnerability in protocol implementation", "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000608" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "11642" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.9 } }
CVE-2003-1441 (GCVE-0-2003-1441)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/11285 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/8018 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/6799 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/3522 | vdb-entry, x_refsource_OSVDB | |
http://www.posadis.org/advisories/pos_adv_003.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "posadis-dns-packet-dos(11285)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" }, { "name": "8018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8018" }, { "name": "6799", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6799" }, { "name": "3522", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3522" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.posadis.org/advisories/pos_adv_003.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Posadis 0.50.4 through 0.50.8 allows remote attackers to cause a denial of service (crash) via a DNS message without a question section, which triggers null dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "posadis-dns-packet-dos(11285)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" }, { "name": "8018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8018" }, { "name": "6799", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6799" }, { "name": "3522", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3522" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.posadis.org/advisories/pos_adv_003.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1441", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Posadis 0.50.4 through 0.50.8 allows remote attackers to cause a denial of service (crash) via a DNS message without a question section, which triggers null dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "posadis-dns-packet-dos(11285)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11285" }, { "name": "8018", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8018" }, { "name": "6799", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6799" }, { "name": "3522", "refsource": "OSVDB", "url": "http://www.osvdb.org/3522" }, { "name": "http://www.posadis.org/advisories/pos_adv_003.txt", "refsource": "CONFIRM", "url": "http://www.posadis.org/advisories/pos_adv_003.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1441", "datePublished": "2007-10-23T01:00:00", "dateReserved": "2007-10-22T00:00:00", "dateUpdated": "2024-08-08T02:28:03.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-0501 (GCVE-0-2002-0501)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/3516 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/4378 | vdb-entry, x_refsource_BID | |
http://sourceforge.net/forum/forum.php?forum_id=165094 | x_refsource_CONFIRM | |
http://www.iss.net/security_center/static/8653.php | vdb-entry, x_refsource_XF | |
http://online.securityfocus.com/archive/1/264450 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:49:28.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3516", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3516" }, { "name": "4378", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4378" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "name": "posadis-logging-format-string(8653)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8653.php" }, { "name": "20020327 Format String Bug in Posadis DNS Server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/264450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in log_print() function of Posadis DNS server before version m5pre2 allows local users and possibly remote attackers to execute arbitrary code via format strings that are inserted into logging messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3516", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3516" }, { "name": "4378", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4378" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "name": "posadis-logging-format-string(8653)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8653.php" }, { "name": "20020327 Format String Bug in Posadis DNS Server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/264450" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in log_print() function of Posadis DNS server before version m5pre2 allows local users and possibly remote attackers to execute arbitrary code via format strings that are inserted into logging messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3516", "refsource": "OSVDB", "url": "http://www.osvdb.org/3516" }, { "name": "4378", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4378" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=165094", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=165094" }, { "name": "posadis-logging-format-string(8653)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8653.php" }, { "name": "20020327 Format String Bug in Posadis DNS Server", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/264450" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0501", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:49:28.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0789 (GCVE-0-2004-0789)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/13145 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1012157 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/11642 | vdb-entry, x_refsource_BID | |
http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en | x_refsource_MISC | |
http://www.posadis.org/advisories/pos_adv_006.txt | x_refsource_CONFIRM | |
http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:46.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "13145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11642" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "13145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11642" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "13145", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11642" }, { "name": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "name": "http://www.posadis.org/advisories/pos_adv_006.txt", "refsource": "CONFIRM", "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "name": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0789", "datePublished": "2005-09-01T04:00:00", "dateReserved": "2004-08-17T00:00:00", "dateUpdated": "2024-08-08T00:31:46.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }