fkie_cve-2008-2105
Vulnerability from fkie_nvd
Published
2008-05-07 20:20
Modified
2025-04-09 00:30
Severity ?
Summary
email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header. NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses.
References
cve@mitre.orghttp://secunia.com/advisories/30064Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30167
cve@mitre.orghttp://www.bugzilla.org/security/2.20.5/
cve@mitre.orghttp://www.securityfocus.com/bid/29038
cve@mitre.orghttp://www.securitytracker.com/id?1019969
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1428/references
cve@mitre.orghttps://bugzilla.mozilla.org/show_bug.cgi?id=419188Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/42235
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00036.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00098.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30064Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30167
af854a3a-2127-422b-91ae-364da2661108http://www.bugzilla.org/security/2.20.5/
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29038
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019969
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1428/references
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.mozilla.org/show_bug.cgi?id=419188Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/42235
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00036.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00098.html
Impacted products
Vendor Product Version
mozilla bugzilla 2.4
mozilla bugzilla 2.6
mozilla bugzilla 2.8
mozilla bugzilla 2.10
mozilla bugzilla 2.12
mozilla bugzilla 2.14
mozilla bugzilla 2.14.1
mozilla bugzilla 2.14.2
mozilla bugzilla 2.14.3
mozilla bugzilla 2.14.4
mozilla bugzilla 2.14.5
mozilla bugzilla 2.16
mozilla bugzilla 2.16.1
mozilla bugzilla 2.16.2
mozilla bugzilla 2.16.3
mozilla bugzilla 2.16.4
mozilla bugzilla 2.16.5
mozilla bugzilla 2.16.6
mozilla bugzilla 2.16.7
mozilla bugzilla 2.16.8
mozilla bugzilla 2.16.9
mozilla bugzilla 2.16.10
mozilla bugzilla 2.16.11
mozilla bugzilla 2.16_rc2
mozilla bugzilla 2.17.1
mozilla bugzilla 2.17.2
mozilla bugzilla 2.17.3
mozilla bugzilla 2.17.4
mozilla bugzilla 2.17.5
mozilla bugzilla 2.17.6
mozilla bugzilla 2.17.7
mozilla bugzilla 2.18
mozilla bugzilla 2.18
mozilla bugzilla 2.18
mozilla bugzilla 2.18.1
mozilla bugzilla 2.18.2
mozilla bugzilla 2.18.3
mozilla bugzilla 2.18.4
mozilla bugzilla 2.18.5
mozilla bugzilla 2.18.6
mozilla bugzilla 2.19.1
mozilla bugzilla 2.19.2
mozilla bugzilla 2.19.3
mozilla bugzilla 2.20
mozilla bugzilla 2.20
mozilla bugzilla 2.20.1
mozilla bugzilla 2.20.2
mozilla bugzilla 2.20.3
mozilla bugzilla 2.20.4
mozilla bugzilla 2.20.5
mozilla bugzilla 2.20.6
mozilla bugzilla 2.21.1
mozilla bugzilla 2.21.2
mozilla bugzilla 2.22
mozilla bugzilla 2.22
mozilla bugzilla 2.22.1
mozilla bugzilla 2.22.2
mozilla bugzilla 2.22.3
mozilla bugzilla 2.22.4
mozilla bugzilla 2.23
mozilla bugzilla 2.23.1
mozilla bugzilla 2.23.2
mozilla bugzilla 2.23.3
mozilla bugzilla 2.23.4
mozilla bugzilla 3.0.0
mozilla bugzilla 3.0.1
mozilla bugzilla 3.0.2
mozilla bugzilla 3.1.0
mozilla bugzilla 3.1.1
mozilla bugzilla 3.1.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8112FF13-B4CE-4DC7-85B1-C69D975F162B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E5E379-D475-42F3-B0DC-3D04C1D25566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "893741D3-062B-45F9-B5A3-1B81058E7FD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D53B5F-6AEE-4192-B838-E1DA92C59285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D351AF2-C0AB-4BB3-8692-677A3025A615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5877CECA-F758-4F48-B4F4-2C4C1DF01FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4CC7E4-617D-498E-A367-374478158FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "930AF809-CA52-41CB-985A-066B8239C7CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E9EC243-3E25-4234-A88A-FDD5B594BFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1C166E42-9B36-4883-B738-EEBEF3056D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "02846865-D124-4C72-85C8-59A7C6F43E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B59422-ED6E-4F82-8D0C-091058D1C438",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F658844A-6253-4A18-8A5D-1E818BE7A367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4753AB35-B95C-4544-A874-5E6D83929AC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4880D54-CA42-4CCA-B01E-2C125002BF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C36666-518F-4956-816A-940930425955",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header.  NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses."
    },
    {
      "lang": "es",
      "value": "El archivo email_in.pl en Bugzilla versi\u00f3n 2.23.4, versiones 3.0.x anteriores a 3.0.4, y versiones 3.1.x anteriores a 3.1.4, permite a usuarios autentificados remotos falsificar m\u00e1s f\u00e1cilmente al cambiador de un bug por medio  de un comando @reporter en el cuerpo de un mensaje de correo electr\u00f3nico, que inv\u00e1lida la direcci\u00f3n de correo electr\u00f3nico tal y como es obtenida normalmente desde el encabezado de correo electr\u00f3nico From. NOTA: puesto que los encabezados From son f\u00e1cilmente falsificados, esto s\u00f3lo cruza los l\u00edmites de privilegios en entornos que proporcionan una comprobaci\u00f3n adicional de direcciones de correo electr\u00f3nico."
    }
  ],
  "id": "CVE-2008-2105",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-05-07T20:20:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30064"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30167"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.bugzilla.org/security/2.20.5/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/29038"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019969"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1428/references"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=419188"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42235"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00036.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00098.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30064"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.bugzilla.org/security/2.20.5/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/29038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019969"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1428/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=419188"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42235"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00098.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…