Lucene search

K
nvd[email protected]NVD:CVE-2008-5025
HistoryNov 17, 2008 - 11:30 p.m.

CVE-2008-5025

2008-11-1723:30:00
CWE-119
web.nvd.nist.gov
1

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

5.6

Confidence

High

EPSS

0.002

Percentile

64.9%

Stack-based buffer overflow in the hfs_cat_find_brec function in fs/hfs/catalog.c in the Linux kernel before 2.6.28-rc1 allows attackers to cause a denial of service (memory corruption or system crash) via an hfs filesystem image with an invalid catalog namelength field, a related issue to CVE-2008-4933.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.6.28
OR
linuxlinux_kernelMatch2.2.27
OR
linuxlinux_kernelMatch2.4.36
OR
linuxlinux_kernelMatch2.4.36.1
OR
linuxlinux_kernelMatch2.4.36.2
OR
linuxlinux_kernelMatch2.4.36.3
OR
linuxlinux_kernelMatch2.4.36.4
OR
linuxlinux_kernelMatch2.4.36.5
OR
linuxlinux_kernelMatch2.4.36.6
OR
linuxlinux_kernelMatch2.6
OR
linuxlinux_kernelMatch2.6.18
OR
linuxlinux_kernelMatch2.6.18rc1
OR
linuxlinux_kernelMatch2.6.18rc2
OR
linuxlinux_kernelMatch2.6.18rc3
OR
linuxlinux_kernelMatch2.6.18rc4
OR
linuxlinux_kernelMatch2.6.18rc5
OR
linuxlinux_kernelMatch2.6.18rc6
OR
linuxlinux_kernelMatch2.6.18rc7
OR
linuxlinux_kernelMatch2.6.19.4
OR
linuxlinux_kernelMatch2.6.19.5
OR
linuxlinux_kernelMatch2.6.19.6
OR
linuxlinux_kernelMatch2.6.19.7
OR
linuxlinux_kernelMatch2.6.20.16
OR
linuxlinux_kernelMatch2.6.20.17
OR
linuxlinux_kernelMatch2.6.20.18
OR
linuxlinux_kernelMatch2.6.20.19
OR
linuxlinux_kernelMatch2.6.20.20
OR
linuxlinux_kernelMatch2.6.20.21
OR
linuxlinux_kernelMatch2.6.21.5
OR
linuxlinux_kernelMatch2.6.21.6
OR
linuxlinux_kernelMatch2.6.21.7
OR
linuxlinux_kernelMatch2.6.22
OR
linuxlinux_kernelMatch2.6.22.1
OR
linuxlinux_kernelMatch2.6.22.2
OR
linuxlinux_kernelMatch2.6.22.8
OR
linuxlinux_kernelMatch2.6.22.9
OR
linuxlinux_kernelMatch2.6.22.10
OR
linuxlinux_kernelMatch2.6.22.11
OR
linuxlinux_kernelMatch2.6.22.12
OR
linuxlinux_kernelMatch2.6.22.13
OR
linuxlinux_kernelMatch2.6.22.14
OR
linuxlinux_kernelMatch2.6.22.15
OR
linuxlinux_kernelMatch2.6.22.17
OR
linuxlinux_kernelMatch2.6.22.18
OR
linuxlinux_kernelMatch2.6.22.19
OR
linuxlinux_kernelMatch2.6.22.20
OR
linuxlinux_kernelMatch2.6.22.21
OR
linuxlinux_kernelMatch2.6.22.22
OR
linuxlinux_kernelMatch2.6.22_rc1
OR
linuxlinux_kernelMatch2.6.22_rc7
OR
linuxlinux_kernelMatch2.6.23
OR
linuxlinux_kernelMatch2.6.23.8
OR
linuxlinux_kernelMatch2.6.23.9
OR
linuxlinux_kernelMatch2.6.23.10
OR
linuxlinux_kernelMatch2.6.23.11
OR
linuxlinux_kernelMatch2.6.23.12
OR
linuxlinux_kernelMatch2.6.23.13
OR
linuxlinux_kernelMatch2.6.23.15
OR
linuxlinux_kernelMatch2.6.23.16
OR
linuxlinux_kernelMatch2.6.23.17
OR
linuxlinux_kernelMatch2.6.23_rc1
OR
linuxlinux_kernelMatch2.6.24
OR
linuxlinux_kernelMatch2.6.24.1
OR
linuxlinux_kernelMatch2.6.24.2
OR
linuxlinux_kernelMatch2.6.24.3
OR
linuxlinux_kernelMatch2.6.24.4
OR
linuxlinux_kernelMatch2.6.24.5
OR
linuxlinux_kernelMatch2.6.24.6
OR
linuxlinux_kernelMatch2.6.24.7
OR
linuxlinux_kernelMatch2.6.24_rc1
OR
linuxlinux_kernelMatch2.6.24_rc4
OR
linuxlinux_kernelMatch2.6.24_rc5
OR
linuxlinux_kernelMatch2.6.25
OR
linuxlinux_kernelMatch2.6.25x86_64
OR
linuxlinux_kernelMatch2.6.25.1
OR
linuxlinux_kernelMatch2.6.25.1x86_64
OR
linuxlinux_kernelMatch2.6.25.2
OR
linuxlinux_kernelMatch2.6.25.2x86_64
OR
linuxlinux_kernelMatch2.6.25.3
OR
linuxlinux_kernelMatch2.6.25.3x86_64
OR
linuxlinux_kernelMatch2.6.25.4
OR
linuxlinux_kernelMatch2.6.25.4x86_64
OR
linuxlinux_kernelMatch2.6.25.5
OR
linuxlinux_kernelMatch2.6.25.5x86_64
OR
linuxlinux_kernelMatch2.6.25.6
OR
linuxlinux_kernelMatch2.6.25.6x86_64
OR
linuxlinux_kernelMatch2.6.25.7
OR
linuxlinux_kernelMatch2.6.25.7x86_64
OR
linuxlinux_kernelMatch2.6.25.8
OR
linuxlinux_kernelMatch2.6.25.8x86_64
OR
linuxlinux_kernelMatch2.6.25.9
OR
linuxlinux_kernelMatch2.6.25.9x86_64
OR
linuxlinux_kernelMatch2.6.25.10
OR
linuxlinux_kernelMatch2.6.25.10x86_64
OR
linuxlinux_kernelMatch2.6.25.11
OR
linuxlinux_kernelMatch2.6.25.11x86_64
OR
linuxlinux_kernelMatch2.6.25.12
OR
linuxlinux_kernelMatch2.6.25.12x86_64
OR
linuxlinux_kernelMatch2.6.25.13
OR
linuxlinux_kernelMatch2.6.25.14
OR
linuxlinux_kernelMatch2.6.25.15
OR
linuxlinux_kernelMatch2.6.25.16
OR
linuxlinux_kernelMatch2.6.25.17
OR
linuxlinux_kernelMatch2.6.26
OR
linuxlinux_kernelMatch2.6.26.1
OR
linuxlinux_kernelMatch2.6.26.2
OR
linuxlinux_kernelMatch2.6.26.3
OR
linuxlinux_kernelMatch2.6.26.4
OR
linuxlinux_kernelMatch2.6.26.5
OR
linuxlinux_kernelMatch2.6.27

References

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

5.6

Confidence

High

EPSS

0.002

Percentile

64.9%