fkie_cve-2004-1816
Vulnerability from fkie_nvd
Published
2004-03-15 05:00
Modified
2024-11-20 23:51
Severity ?
Summary
Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | coldfusion | 6.0 | |
macromedia | coldfusion | 6.1 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0_build_61650 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B79C39FD-D9A0-4CA4-BF37-D94D9F20E4C1", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C65BE0-32FA-4D51-AA2B-E7D630470D19", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "7C101B23-DD69-4020-A252-A808925DB093", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1a:*:*:*:*:*:*", "matchCriteriaId": "7490205B-E8CF-4088-8FD7-3CEE672E2A10", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0_build_61650:*:*:*:*:*:*:*", "matchCriteriaId": "75E7B136-FAC8-4105-825F-6CC31A76E64B", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*", "matchCriteriaId": "0F6B3BC6-9A4B-40E7-A540-9BCFC3D02E66", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*", "matchCriteriaId": "9760BDBA-E5FD-4AFF-ACB8-4C8B55CC3A61", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*", "matchCriteriaId": "37553E5D-7B68-40C4-B970-FA0D02B7D3D9", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*", "matchCriteriaId": "3D089210-2135-4D41-92AD-51FB97AB343E", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*", "matchCriteriaId": "C2C8EF3B-1A44-4D15-B2BE-FC970281760C", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*", "matchCriteriaId": "E3597345-9D0B-492B-99BC-1C992EBF7CD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption)." } ], "id": "CVE-2004-1816", "lastModified": "2024-11-20T23:51:48.623", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-03-15T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11130" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9877" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.