// For flags

CVE-2007-6315

barracudadrive 3.7.2 - Multiple Vulnerabilities

Severity Score

4.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Group Chat in BarracudaDrive Web Server before 3.8 allows remote authenticated users to cause a denial of service (crash) via a HTTP request to /eh/chat.ehintf/C. that does not contain a Connection ID, which results in a NULL pointer dereference.

Group Chat en el servidor web BarracudaDrive anterior a 3.8 permite a usuarios remotos validados provocar denegación de servicio (caida) a tavés de una respuesta HTTP en /eh/chat.ehintf/C. que no contiene un conexión ID, la cual deriva en una referencia a un puntero NULL.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-12-10 First Exploit
  • 2007-12-11 CVE Reserved
  • 2007-12-12 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-10-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Real Time Logic
Search vendor "Real Time Logic"
Barracudadrive Web Server
Search vendor "Real Time Logic" for product "Barracudadrive Web Server"
3.7.2
Search vendor "Real Time Logic" for product "Barracudadrive Web Server" and version "3.7.2"
-
Affected
Real Time Logic
Search vendor "Real Time Logic"
Barracudadrive Web Server Home Server
Search vendor "Real Time Logic" for product "Barracudadrive Web Server Home Server"
3.7.2
Search vendor "Real Time Logic" for product "Barracudadrive Web Server Home Server" and version "3.7.2"
-
Affected