Show plain JSON{"id": "CVE-2007-2151", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-04-19T10:19:00.000", "references": [{"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=516", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/24893", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/23544", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1017929", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2007/1434", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33730", "source": "cve@mitre.org"}, {"url": "https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=612751&command=show&forward=nonthreadedKC", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=516", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/24893", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/23544", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1017929", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2007/1434", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33730", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=612751&command=show&forward=nonthreadedKC", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The administration server in McAfee e-Business Server before 8.1.1 and 8.5.x before 8.5.2 allows remote attackers to cause a denial of service (service crash) via a large length value in a malformed authentication packet, which triggers a heap over-read."}, {"lang": "es", "value": "El servidor de administraci\u00f3n en McAfee e-Business Server versiones anteriores a 8.1.1 y 8.5.x versiones anteriores a 8.5.2, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de servicio) mediante un valor de longitud larga en un paquete de autenticaci\u00f3n mal-formado, que dispara sobre-lectura de mont\u00f3n."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mcafee:e-business_server:8.1:*:aix:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "386FFF34-BB0A-4393-A918-D82321F7731E"}, {"criteria": "cpe:2.3:a:mcafee:e-business_server:8.1:*:hp-ux:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F41BCD7-FABC-45A9-90F6-33562B06CE84"}, {"criteria": "cpe:2.3:a:mcafee:e-business_server:8.1:*:linux:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C85ACF8B-6586-4547-AD6A-B6ECA2F5B554"}, {"criteria": "cpe:2.3:a:mcafee:e-business_server:8.5.1:*:solaris:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F52F8556-407E-4D2F-A882-A2C8A607ED70"}, {"criteria": "cpe:2.3:a:mcafee:e-business_server:8.5.1:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "857F9BB0-0BBB-4AD6-9710-1AD7E4E832FD"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org", "evaluatorSolution": "The vendor has addressed this issue in the following product update:\r\nhttps://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=612751&command=show&forward=nonthreadedKC"}