CVE-2008-0445

The replace_inline_img function in elogd in Electronic Logbook (ELOG) before 2.7.1 allows remote attackers to cause a denial of service (infinite loop) via crafted logbook entries. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:elog:elog:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.5.9:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:elog:elog:2.6.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:42

Type Values Removed Values Added
References () http://secunia.com/advisories/28589 - Vendor Advisory () http://secunia.com/advisories/28589 - Vendor Advisory
References () http://www.securityfocus.com/bid/27399 - Patch () http://www.securityfocus.com/bid/27399 - Patch
References () http://www.vupen.com/english/advisories/2008/0265 - () http://www.vupen.com/english/advisories/2008/0265 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/39824 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/39824 -

Information

Published : 2008-01-25 00:00

Updated : 2025-04-09 00:30


NVD link : CVE-2008-0445

Mitre link : CVE-2008-0445

CVE.ORG link : CVE-2008-0445


JSON object : View

Products Affected

elog

  • elog