Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "40D8DAE0-8E75-435C-9BD6-FAEED2ACB47C", "vulnerable": false}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49", "vulnerable": false}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F425AD1B-0D85-4294-9E9F-3EC1EFE0B658", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D305ED07-C6C8-437F-9B32-0E4A3AEEA3DA", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A9E40C59-2A21-4CC5-BADA-AFB46386ADCD", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "21DC1316-FF41-49F3-BF0C-09E0CFF70AE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C6D4739B-BA4D-4D58-8C0C-F4DA1AC09D51", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "79542EF5-EEED-4FBE-8722-D07907942643", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "87C483DE-8DC5-4A74-8F7F-DB30AD63BB20", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A24362D-12C1-4121-9E40-EA3A67A8BF82", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "36708BE2-A437-4FF1-9A1E-772765C8FD5F", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FA26B597-CA83-4F62-90DF-CC103395B412", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "64B83EAF-BE04-4DA4-B868-2A15B0D0C5BB", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "2B27B315-0C20-49F7-B638-E27C677CBAF4", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "2FF5AC4C-397E-4AF7-846F-CAA72E93DA72", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5001819C-C4DF-444D-945C-2577AD91A014", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "DA3FCFD0-A79F-447E-B5CF-7CF599E9BFDF", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "05DC66F1-ECC4-47AD-8F47-135FDA2E0A68", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "5EBF66A8-685E-4357-BC8C-D9E8CBFED91A", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFBEABE0-DA68-4037-B044-0DD8E83A21F3", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "160A31D8-A7B2-425A-9D7F-124575D18825", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D266656-4DAD-4FA6-9874-21CA15952AB4", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "42FBD1A1-CB90-4EE8-B192-2659AA3F961B", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D50A535-D0C4-4A88-A6E3-23830B82BC29", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "97626749-3A3C-4F91-971B-01CB01ED285A", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "38A8564D-8301-4F77-8349-06A723F20C1B", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "88280371-39DB-45B5-BC79-85B05984123B", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F149C664-511D-497F-84F7-90D9214F9E57", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EDDC295-24D7-4E8B-A681-FD8099B1F1E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB23F46F-C33B-4CEA-AC7D-2A517A54D199", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B403417-3384-4E0E-A20A-F11D3572533D", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C0D786E6-7D73-45D1-88D8-2966E5FD237F", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:vsftpd:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "54922D08-A055-41EE-A818-BD3E6FA85494", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962."}, {"lang": "es", "value": "Fuga de memoria en cierta implementaci\u00f3n de Red Hat de vsftpd anterior a 2.0.5 en Red Hat Enterprise Linux (RHEL) 3 y 4, cuando se utiliza PAM, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) mediante un gran n\u00famero de intentos de autenticaci\u00f3n no v\u00e1lidos en la misma sesi\u00f3n. Se trata de una vulnerabilidad diferente de CVE-2007-5962."}], "id": "CVE-2008-2375", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2008-07-09T00:41:00.000", "references": [{"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31007"}, {"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/31223"}, {"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/32263"}, {"source": "secalert@redhat.com", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-398.htm"}, {"source": "secalert@redhat.com", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0217"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2008/06/30/2"}, {"source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0579.html"}, {"source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0680.html"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/494081/100/0/threaded"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/30364"}, {"source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1020546"}, {"source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2008/2820"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "https://bugzilla.redhat.com/attachment.cgi?id=201051"}, {"source": "secalert@redhat.com", "url": "https://issues.rpath.com/browse/RPL-2640"}, {"source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10138"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31007"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31223"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32263"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-398.htm"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0217"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/06/30/2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0579.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0680.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/494081/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30364"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020546"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2820"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "https://bugzilla.redhat.com/attachment.cgi?id=201051"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-2640"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10138"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}, {"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}