ID CVE-2008-7194
Summary Unspecified vulnerability in Fujitsu Interstage HTTP Server, as used in Interstage Application Server 5.0, 7.0, 7.0.1, and 8.0.0 for Windows, allows attackers to cause a denial of service via a crafted request.
References
Vulnerable Configurations
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:enterprise:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:enterprise:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:standard:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:standard:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:standard_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:standard_windows:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:web_j:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:web_j:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:web_j_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:web_j_windows:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:enterprise:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:enterprise:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:enterprise_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:enterprise_windows:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_developer:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_developer:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_developer_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_developer_windows:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_windows:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:standard:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:standard:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:enterprise:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:enterprise:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:enterprise_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:enterprise_windows:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:plus:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:plus:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:plus_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:plus_windows:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:enterprise:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:enterprise:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:enterprise_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:enterprise_windows:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:standard_j:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:standard_j:*:*:*:*:*
  • cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:standard_j_windows:*:*:*:*:*
    cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:standard_j_windows:*:*:*:*:*
CVSS
Base: 5.0 (as of 17-08-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 27391
confirm http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
secunia 28606
vupen ADV-2008-0233
xf interstagehttpserver-requests-dos(39847)
Last major update 17-08-2017 - 01:29
Published 10-09-2009 - 10:30
Last modified 17-08-2017 - 01:29
Back to Top