CVE-2009-2108
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
18/06/2009
Last modified:
09/04/2025
Description
git-daemon in git 1.4.4.5 through 1.6.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a request containing extra unrecognized arguments.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:git:git:1.4.4.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0:rc4:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:git:git:1.5.1.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://article.gmane.org/gmane.comp.version-control.git/120733
- http://osvdb.org/55034
- http://secunia.com/advisories/35437
- http://secunia.com/advisories/35730
- http://security.gentoo.org/glsa/glsa-200907-05.xml
- http://thread.gmane.org/gmane.comp.version-control.git/120724
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A155
- http://www.openwall.com/lists/oss-security/2009/06/12/1
- http://www.securityfocus.com/bid/35338
- http://www.securitytracker.com/id?1022398=
- http://www.vupen.com/english/advisories/2009/1579
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51083
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01045.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01056.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01126.html
- https://www.redhat.com/archives/fedora-security-list/2009-June/msg00000.html
- http://article.gmane.org/gmane.comp.version-control.git/120733
- http://osvdb.org/55034
- http://secunia.com/advisories/35437
- http://secunia.com/advisories/35730
- http://security.gentoo.org/glsa/glsa-200907-05.xml
- http://thread.gmane.org/gmane.comp.version-control.git/120724
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A155
- http://www.openwall.com/lists/oss-security/2009/06/12/1
- http://www.securityfocus.com/bid/35338
- http://www.securitytracker.com/id?1022398=
- http://www.vupen.com/english/advisories/2009/1579
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51083
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01045.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01056.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01126.html
- https://www.redhat.com/archives/fedora-security-list/2009-June/msg00000.html