Vulnerability Description
Perlbal before 1.70, when buffered upload is enabled, allows remote attackers to cause a denial of service (crash) via a zero-byte chunked upload.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perlbal | Perlbal | <= 1.60 |
Related Weaknesses (CWE)
References
- http://bugs.gentoo.org/show_bug.cgi?id=214784
- http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES
- http://secunia.com/advisories/29565
- http://secunia.com/advisories/29619
- http://www.securityfocus.com/bid/28491
- http://www.vupen.com/english/advisories/2008/1045/references
- https://bugzilla.redhat.com/show_bug.cgi?id=439054
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41538
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00665.html
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00672.html
- http://bugs.gentoo.org/show_bug.cgi?id=214784
- http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES
- http://secunia.com/advisories/29565
- http://secunia.com/advisories/29619
- http://www.securityfocus.com/bid/28491
FAQ
What is CVE-2008-1532?
CVE-2008-1532 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Perlbal before 1.70, when buffered upload is enabled, allows remote attackers to cause a denial of service (crash) via a zero-byte chunked upload.
How severe is CVE-2008-1532?
CVE-2008-1532 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1532?
Check the references section above for vendor advisories and patch information. Affected products include: Perlbal Perlbal.