fkie_cve-2008-1996
Vulnerability from fkie_nvd
Published
2008-04-28 20:05
Modified
2025-04-09 00:30
Severity ?
Summary
licq before 1.3.6 allows remote attackers to cause a denial of service (file-descriptor exhaustion and application crash) via a large number of connections.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
cve@mitre.orghttp://seclists.org/bugtraq/2008/Apr/0100.html
cve@mitre.orghttp://secunia.com/advisories/30055
cve@mitre.orghttp://secunia.com/advisories/30236
cve@mitre.orghttp://securityreason.com/securityalert/3851
cve@mitre.orghttp://www.licq.org/changeset/6146
cve@mitre.orghttp://www.licq.org/ticket/1623
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:159
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/04/25/1
cve@mitre.orghttp://www.securityfocus.com/archive/1/490563Exploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/490717
cve@mitre.orghttp://www.securityfocus.com/bid/28679
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1446/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41732
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/bugtraq/2008/Apr/0100.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30055
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30236
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3851
af854a3a-2127-422b-91ae-364da2661108http://www.licq.org/changeset/6146
af854a3a-2127-422b-91ae-364da2661108http://www.licq.org/ticket/1623
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:159
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/04/25/1
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/490563Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/490717
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28679
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1446/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41732
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html
Impacted products
Vendor Product Version
licq licq 0.61
licq licq 0.71
licq licq 0.75
licq licq 0.75.1
licq licq 0.75.2
licq licq 0.75.3
licq licq 0.75.3a
licq licq 0.75_991219
licq licq 0.76
licq licq 0.80
licq licq 0.81
licq licq 0.84a
licq licq 0.84b
licq licq 0.85
licq licq 1.0
licq licq 1.0.1
licq licq 1.0.2
licq licq 1.0.3
licq licq 1.0.4
licq licq 1.2
licq licq 1.2.3
licq licq 1.2.4
licq licq 1.2.6
licq licq 1.2.7
licq licq 1.3.0
licq licq 1.3.0_pre
licq licq 1.3.2
licq licq 1.3.2_rc
licq licq 1.3.4
licq licq 1.3.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:licq:licq:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF5C07FE-E369-45A5-BAD8-D12B6CCA3AE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3504C4C-B292-4DF7-8AB2-B012667546DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "99DF4EC3-7CD1-48C1-921E-0644444A0565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B31462B-CF61-40C9-98BC-4FE6FBE9049E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "211009EF-2C6C-4463-B3D2-C7B406A303AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531894C-321C-4E91-A3DB-CDD5D38FDF91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AECEB0-3D0D-4C64-A928-0E52AA4F4F0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.75_991219:*:*:*:*:*:*:*",
              "matchCriteriaId": "8615B703-A767-4F1D-8B56-8CB7BBCDF2BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "5632AE68-5842-4D3E-93B0-266345697D60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B64A9DE-78EA-457E-A4BD-4446A8C096D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE6AF6A-ABDA-401A-B5DF-343AB8A656F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.84a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD25CC42-5156-4E43-8EBF-CB9804333715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.84b:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C55845B-A772-4B54-B794-0D4EECEC74CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D66C44-8AA4-4874-BD74-E959CEC26F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA200C7-5602-418C-B1B3-2825680BEA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD313EF-B6BA-41C1-96F0-645D872242FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E40E03-411D-4EFA-9620-574BACE357B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C3EEA7-56B7-4F20-8701-8D26EF853697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "47334B83-4DC7-4EDD-B10D-3A8A4D0D81C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B06B0DE-4303-4F19-868B-821939F37A5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "19922E12-CC67-4177-B4FB-CD958ABE9E58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "555C61F1-1518-480D-A5C7-03DFA2680CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5847F57C-E596-42D6-AFCA-88DA1AADF040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1825DF7D-12D5-4467-8F2A-67DCD12F83A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3A0651-CDD9-4E72-BE33-F6446DCE7387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.0_pre:*:*:*:*:*:*:*",
              "matchCriteriaId": "E80CB706-CAE3-4E9A-96C5-8A4E147736F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE97E63-2913-4B4E-A9E6-22FCA297FA17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.2_rc:*:*:*:*:*:*:*",
              "matchCriteriaId": "966D7E45-582F-47F5-8183-E924D442AC71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA6A213-E65A-4B63-B745-CDED7A1499D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:licq:licq:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2A195F8-A150-4560-8528-17804D284A0A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "licq before 1.3.6 allows remote attackers to cause a denial of service (file-descriptor exhaustion and application crash) via a large number of connections."
    },
    {
      "lang": "es",
      "value": "licq antes de 1.3.6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de descriptores de ficheros y ca\u00edda de la aplicaci\u00f3n) mediante gran n\u00famero de conexiones."
    }
  ],
  "evaluatorComment": "More information located: http://www.securityfocus.com/bid/28679/info",
  "id": "CVE-2008-1996",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-04-28T20:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/bugtraq/2008/Apr/0100.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30055"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30236"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3851"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.licq.org/changeset/6146"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.licq.org/ticket/1623"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:159"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/04/25/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/archive/1/490563"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/490717"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28679"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1446/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41732"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/bugtraq/2008/Apr/0100.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.licq.org/changeset/6146"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.licq.org/ticket/1623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/04/25/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/archive/1/490563"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/490717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28679"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1446/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…