Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2008-2375

Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.037
EPSS Ranking 87.3%
CVSS Severity
CVSS v2 Score 7.1
References
Products affected by CVE-2008-2375
  • Redhat » Vsftpd » Version: 0.0.1
    cpe:2.3:a:redhat:vsftpd:0.0.1
  • Redhat » Vsftpd » Version: 0.0.10
    cpe:2.3:a:redhat:vsftpd:0.0.10
  • Redhat » Vsftpd » Version: 0.0.11
    cpe:2.3:a:redhat:vsftpd:0.0.11
  • Redhat » Vsftpd » Version: 0.0.12
    cpe:2.3:a:redhat:vsftpd:0.0.12
  • Redhat » Vsftpd » Version: 0.0.13
    cpe:2.3:a:redhat:vsftpd:0.0.13
  • Redhat » Vsftpd » Version: 0.0.14
    cpe:2.3:a:redhat:vsftpd:0.0.14
  • Redhat » Vsftpd » Version: 0.0.15
    cpe:2.3:a:redhat:vsftpd:0.0.15
  • Redhat » Vsftpd » Version: 0.0.2
    cpe:2.3:a:redhat:vsftpd:0.0.2
  • Redhat » Vsftpd » Version: 0.0.3
    cpe:2.3:a:redhat:vsftpd:0.0.3
  • Redhat » Vsftpd » Version: 0.0.4
    cpe:2.3:a:redhat:vsftpd:0.0.4
  • Redhat » Vsftpd » Version: 0.0.5
    cpe:2.3:a:redhat:vsftpd:0.0.5
  • Redhat » Vsftpd » Version: 0.0.6
    cpe:2.3:a:redhat:vsftpd:0.0.6
  • Redhat » Vsftpd » Version: 0.0.7
    cpe:2.3:a:redhat:vsftpd:0.0.7
  • Redhat » Vsftpd » Version: 0.0.8
    cpe:2.3:a:redhat:vsftpd:0.0.8
  • Redhat » Vsftpd » Version: 0.0.9
    cpe:2.3:a:redhat:vsftpd:0.0.9
  • Redhat » Vsftpd » Version: 0.9.0
    cpe:2.3:a:redhat:vsftpd:0.9.0
  • Redhat » Vsftpd » Version: 0.9.1
    cpe:2.3:a:redhat:vsftpd:0.9.1
  • Redhat » Vsftpd » Version: 0.9.2
    cpe:2.3:a:redhat:vsftpd:0.9.2
  • Redhat » Vsftpd » Version: 0.9.3
    cpe:2.3:a:redhat:vsftpd:0.9.3
  • Redhat » Vsftpd » Version: 1.1.0
    cpe:2.3:a:redhat:vsftpd:1.1.0
  • Redhat » Vsftpd » Version: 1.1.1
    cpe:2.3:a:redhat:vsftpd:1.1.1
  • Redhat » Vsftpd » Version: 1.1.2
    cpe:2.3:a:redhat:vsftpd:1.1.2
  • Redhat » Vsftpd » Version: 1.1.3
    cpe:2.3:a:redhat:vsftpd:1.1.3
  • Redhat » Vsftpd » Version: 1.2.0
    cpe:2.3:a:redhat:vsftpd:1.2.0
  • Redhat » Vsftpd » Version: 1.2.1
    cpe:2.3:a:redhat:vsftpd:1.2.1
  • Redhat » Vsftpd » Version: 1.2.2
    cpe:2.3:a:redhat:vsftpd:1.2.2
  • Redhat » Vsftpd » Version: 2.0.0
    cpe:2.3:a:redhat:vsftpd:2.0.0
  • Redhat » Vsftpd » Version: 2.0.1
    cpe:2.3:a:redhat:vsftpd:2.0.1
  • Redhat » Vsftpd » Version: 2.0.2
    cpe:2.3:a:redhat:vsftpd:2.0.2
  • Redhat » Vsftpd » Version: 2.0.3
    cpe:2.3:a:redhat:vsftpd:2.0.3
  • Redhat » Vsftpd » Version: 2.0.4
    cpe:2.3:a:redhat:vsftpd:2.0.4
  • Redhat » Enterprise Linux » Version: 3.0
    cpe:2.3:o:redhat:enterprise_linux:3.0
  • Redhat » Enterprise Linux » Version: 4.0
    cpe:2.3:o:redhat:enterprise_linux:4.0


Contact Us

Shodan ® - All rights reserved