First published: Fri Dec 31 2004(Updated: )
Memory leak in passwd 0.68 allows local users to cause a denial of service (memory consumption) via a large number of failed read attempts from the password buffer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mandrakesoft Mandrake Multi Network Firewall | =8.2 | |
Mandrake Linux | =8.2 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.0 | |
Mandrake Linux | =8.2 | |
Mandrake Linux | =9.1 | |
Mandrake Linux | =10.0 | |
Mandrake Linux | =9.1 | |
Mandriva Linux Corporate Server | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2395 is considered a medium severity vulnerability due to its potential to cause a denial of service by depleting system memory.
To fix CVE-2004-2395, upgrade to a version of passwd that has addressed this memory leak issue.
CVE-2004-2395 affects multiple versions of Mandrake Linux, including versions 8.2, 9.0, 9.1, 9.2, and Mandriva Linux Corporate Server 2.1.
CVE-2004-2395 can lead to significant system performance degradation due to excessive memory consumption from failed read attempts.
There are currently no widely reported exploits specifically demonstrating CVE-2004-2395, but the vulnerability's presence warrants prompt attention.