CVE-2004-1174

direntry.c in Midnight Commander (mc) 4.5.55 and earlier allows attackers to cause a denial of service by "manipulating non-existing file handles."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.54:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*
cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:50

Type Values Removed Values Added
References () http://secunia.com/advisories/13863/ - Patch, Vendor Advisory () http://secunia.com/advisories/13863/ - Patch, Vendor Advisory
References () http://securitytracker.com/id?1012903 - () http://securitytracker.com/id?1012903 -
References () http://www.debian.org/security/2005/dsa-639 - Patch, Vendor Advisory () http://www.debian.org/security/2005/dsa-639 - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-512.html - () http://www.redhat.com/support/errata/RHSA-2005-512.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18909 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18909 -

Information

Published : 2005-04-14 04:00

Updated : 2024-11-20 23:50


NVD link : CVE-2004-1174

Mitre link : CVE-2004-1174

CVE.ORG link : CVE-2004-1174


JSON object : View

Products Affected

debian

  • debian_linux

suse

  • suse_linux

turbolinux

  • turbolinux_server
  • turbolinux_workstation

redhat

  • linux_advanced_workstation
  • enterprise_linux

gentoo

  • linux

midnight_commander

  • midnight_commander