fkie_cve-2008-7227
Vulnerability from fkie_nvd
Published
2009-09-14 14:30
Modified
2024-11-21 00:58
Severity ?
Summary
PartialBufferOutputStream2 in GeoServer before 1.6.1 and 1.7.0-beta1 attempts to flush buffer contents even when it is handling an "in memory buffer," which prevents the reporting of a service exception, with unknown impact and attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
geoserver | geoserver | * | |
geoserver | geoserver | 1.3.0 | |
geoserver | geoserver | 1.3.0 | |
geoserver | geoserver | 1.3.0 | |
geoserver | geoserver | 1.3.0 | |
geoserver | geoserver | 1.3.0 | |
geoserver | geoserver | 1.3.0 | |
geoserver | geoserver | 1.3.0 | |
geoserver | geoserver | 1.3.2 | |
geoserver | geoserver | 1.4.0 | |
geoserver | geoserver | 1.4.0 | |
geoserver | geoserver | 1.5.0 | |
geoserver | geoserver | 1.5.0 | |
geoserver | geoserver | 1.5.0 | |
geoserver | geoserver | 1.5.1 | |
geoserver | geoserver | 1.5.1 | |
geoserver | geoserver | 1.5.2 | |
geoserver | geoserver | 1.5.3 | |
geoserver | geoserver | 1.6.0 | |
geoserver | geoserver | 1.6.0 | |
geoserver | geoserver | 1.6.0 | |
geoserver | geoserver | 1.6.0 | |
geoserver | geoserver | 1.6.0 | |
geoserver | geoserver | 1.6.0 | |
geoserver | geoserver | 1.7.0 | |
geoserver | geoserver | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:geoserver:geoserver:*:beta4:*:*:*:*:*:*", "matchCriteriaId": "3EEBA7FF-3004-41A1-A803-35B5A7175A49", "versionEndIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE4C62CD-9AF7-4C6A-88AA-26829892A20E", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.3.0:beta:*:*:*:*:*:*", "matchCriteriaId": "37EDEF23-FF7A-44B7-8A0E-232264C172FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.3.0:pr1:*:*:*:*:*:*", "matchCriteriaId": "B85C7FA5-F40A-4DAF-9F8D-58FC9F42DD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "033E86CF-49DF-4838-BA6C-E6087A5C72B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.3.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "620491F7-0AF2-4684-AA81-737B0D25B265", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.3.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D2083302-AF38-4D99-8744-6A5A92A225DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.3.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "9DBDF056-06C2-4CB7-BA1F-FA8297B86458", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E12CDE69-20CE-4265-94D8-683ACD15C21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.4.0:m0:*:*:*:*:*:*", "matchCriteriaId": "23DC2899-05E8-4E2A-8865-3F07A21E7E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.4.0:m1:*:*:*:*:*:*", "matchCriteriaId": "306779D0-DB91-44F1-B96C-E8DBFBC42C36", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "C4D89DD7-D7A2-470E-98CC-7DE5BE014C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.5.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9A3B8CCC-CB10-4CC0-8A9F-1F3CDC506974", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.5.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "1ECC2970-8445-4CB6-B09C-8B890DDF6B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "468B27AB-5F0D-48C0-BA43-317271A507E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "A36E07B7-67AA-466C-9CD8-F4199B01739A", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "35D08540-9125-4E1E-9E2F-54A237A1CAB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "90191A81-3A2D-4ED6-A69C-1E43C0133EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C5C7C32C-0086-4B67-827D-112A33A690BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "EBB59F80-4C47-4A80-A4A9-0AF125FD19F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "AA5AB47E-A6DD-4C58-9E4B-1C681C58F9DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "642BEFCD-778B-443C-8863-CAFEAF877781", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A9099646-CA75-4431-AAB1-9DF1DE40E567", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "82F7E2B5-D036-469E-AE40-636A2585CD0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:1.7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "7EF678DB-679E-4DFF-B57F-5C51C3F0867E", "vulnerable": true }, { "criteria": "cpe:2.3:a:geoserver:geoserver:3.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "44C2E5C2-536C-4E89-9A9E-D9016D369FF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PartialBufferOutputStream2 in GeoServer before 1.6.1 and 1.7.0-beta1 attempts to flush buffer contents even when it is handling an \"in memory buffer,\" which prevents the reporting of a service exception, with unknown impact and attack vectors." }, { "lang": "es", "value": "PartialBufferOutputStream2 de GeoServer anterior a v1.6.1 y v1.7.0-beta1, intenta renovar los contenidos del b\u00fafer incluso cuando est\u00e1 trabajando un \"b\u00fafer en memoria\", esto evita que se muestren las excepciones en este servicio, lo que tiene un impacto y vectores de ataque desconocidos." } ], "id": "CVE-2008-7227", "lastModified": "2024-11-21T00:58:35.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-09-14T14:30:00.377", "references": [ { "source": "cve@mitre.org", "url": "http://jira.codehaus.org/browse/GEOS-1747" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/43266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jira.codehaus.org/browse/GEOS-1747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/43266" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.