Executive Summary

Informations
Name CVE-2008-3906 First vendor Publication 2008-09-04
Vendor Cve Last vendor Modification 2018-10-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3906

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13875
 
Oval ID: oval:org.mitre.oval:def:13875
Title: USN-826-1 -- mono vulnerabilities
Description: It was discovered that the XML HMAC signature system did not correctly check certain lengths. If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation. It was discovered that Mono did not properly escape certain attributes in the ASP.net class libraries which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. This issue only affected Ubuntu 8.04 LTS. It was discovered that Mono did not properly filter CRLF injections in the query string. If a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, steal confidential data, or perform cross-site request forgeries. This issue only affected Ubuntu 8.04 LTS
Family: unix Class: patch
Reference(s): USN-826-1
CVE-2009-0217
CVE-2008-3422
CVE-2008-3906
Version: 5
Platform(s): Ubuntu 8.10
Ubuntu 8.04
Ubuntu 9.04
Product(s): mono
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 12
Application 8

OpenVAS Exploits

Date Description
2009-12-10 Name : Mandriva Security Advisory MDVSA-2009:322 (mono)
File : nvt/mdksa_2009_322.nasl
2009-09-02 Name : Ubuntu USN-826-1 (mono)
File : nvt/ubuntu_826_1.nasl
2009-04-09 Name : Mandriva Update for mono MDVSA-2008:210 (mono)
File : nvt/gb_mandriva_MDVSA_2008_210.nasl
2009-04-09 Name : Mandriva Update for mono MDVSA-2008:210-1 (mono)
File : nvt/gb_mandriva_MDVSA_2008_210_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
47855 Mono Sys.Web Module HTTP Header Injection

Nessus® Vulnerability Scanner

Date Description
2009-12-08 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2009-322.nasl - Type : ACT_GATHER_INFO
2009-08-27 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-826-1.nasl - Type : ACT_GATHER_INFO
2009-04-23 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2008-210.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/30867
BUGTRAQ http://www.securityfocus.com/archive/1/496845/100/0/threaded
CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0286
https://bugzilla.novell.com/show_bug.cgi?id=418620
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2008:210
MLIST http://www.openwall.com/lists/oss-security/2008/08/27/6
SECUNIA http://secunia.com/advisories/31643
http://secunia.com/advisories/36494
UBUNTU https://usn.ubuntu.com/826-1/
VUPEN http://www.vupen.com/english/advisories/2008/2443
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/44740

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2021-05-05 01:05:02
  • Multiple Updates
2021-05-04 12:07:59
  • Multiple Updates
2021-04-22 01:08:21
  • Multiple Updates
2020-05-24 01:04:43
  • Multiple Updates
2020-05-23 00:22:12
  • Multiple Updates
2018-10-12 00:20:27
  • Multiple Updates
2018-10-04 00:19:33
  • Multiple Updates
2017-08-08 09:24:21
  • Multiple Updates
2016-04-26 17:47:29
  • Multiple Updates
2014-02-17 10:46:21
  • Multiple Updates
2013-05-11 00:25:00
  • Multiple Updates