cpe:/a:microsoft:iis:5.0 cpe:/a:microsoft:iis:5.1 cpe:/a:microsoft:iis:6.0 cpe:/a:microsoft:iis:6.0:beta cpe:/a:microsoft:iis:7.0 cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp1:itanium cpe:/o:microsoft:windows_server_2003::sp1:x64 cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_server_2003::sp2:itanium cpe:/o:microsoft:windows_server_2003::sp2:x64 cpe:/o:microsoft:windows_server_2008 cpe:/o:microsoft:windows_server_2008:::itanium cpe:/o:microsoft:windows_server_2008:::x32 cpe:/o:microsoft:windows_server_2008:::x64 cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_xp::sp2:x64 cpe:/o:microsoft:windows_xp::sp3 CVE-2008-1446 2008-10-14T20:12:15.553-04:00 2017-09-28T21:30:43.050-04:00 9.0 NETWORK LOW SINGLE_INSTANCE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2008-10-15T15:10:00.000-04:00 SECTRACK 1021048 BID 31682 SECUNIA 32248 VUPEN ADV-2008-2813 HP HPSBST02379 IAVM IAVM:2008-B-0075 MS MS08-062 HP SSRT080143 CERT TA08-288A CERT-VN VU#793233 XF win-ipp-service-code-execution(45545) XF win-ms08kb953155-update(45548) Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."