[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-4250Date: (C)2008-10-23   (M)2023-12-22


The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1021091
http://www.securityfocus.com/archive/1/497808/100/0/threaded
http://www.securityfocus.com/archive/1/497816/100/0/threaded
BID-31874
SECUNIA-32326
EXPLOIT-DB-6824
EXPLOIT-DB-6841
EXPLOIT-DB-7104
EXPLOIT-DB-7132
ADV-2008-2902
MS08-067
SSRT080164
TA08-297A
TA09-088A
VU#827267
http://blogs.securiteam.com/index.php/archives/1150
oval:org.mitre.oval:def:6093
win-server-rpc-code-execution(46040)

CPE    6
cpe:/o:microsoft:windows_server_2003:-:sp2
cpe:/o:microsoft:windows_xp:-:sp3
cpe:/o:microsoft:windows_xp:-:sp2
cpe:/o:microsoft:windows_vista:-
...
CWE    1
CWE-94
OVAL    2
oval:org.mitre.oval:def:6093
oval:org.secpod.oval:def:2609

© SecPod Technologies