Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2058

Опубликовано: 09 фев. 2015
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 5jabberdWill not fix
Red Hat Satellite Proxy 5.2jabberdWill not fix
Red Hat Satellite Proxy 5.3jabberdWill not fix
Red Hat Satellite Proxy 5.4jabberdWill not fix
Red Hat Satellite Proxy 5.5jabberdWill not fix
Red Hat Satellite Proxy 5.6jabberdWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-170->CWE-125->CWE-201
https://bugzilla.redhat.com/show_bug.cgi?id=1191149jabberd: buffer overflow when normalizing strings

EPSS

Процентиль: 65%
0.00483
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

nvd
больше 10 лет назад

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

debian
больше 10 лет назад

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates dat ...

github
больше 3 лет назад

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

EPSS

Процентиль: 65%
0.00483
Низкий

2.1 Low

CVSS2