Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2008-1446 | First vendor Publication | 2008-10-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1446 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5764 | |||
Oval ID: | oval:org.mitre.oval:def:5764 | ||
Title: | Integer Overflow in IPP Service Vulnerability | ||
Description: | Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2008-1446 | Version: | 4 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-10-15 | Name : Windows Internet Printing Service Allow Remote Code Execution Vulnerability (... File : nvt/secpod_ms08-062_900052.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
49059 | Microsoft IIS IPP Service Unspecified Remote Overflow |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2008-10-16 | IAVM : 2008-B-0075 - Microsoft Internet Printing Service Remote Code Execution Vulnerability Severity : Category I - VMSKEY : V0017793 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | SMB spoolss EnumJobs response WriteAndX unicode andx attempt RuleID : 14724 - Revision : 12 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response WriteAndX andx attempt RuleID : 14723 - Revision : 12 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response unicode andx attempt RuleID : 14722 - Revision : 12 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response andx attempt RuleID : 14721 - Revision : 12 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response WriteAndX little endian andx attempt RuleID : 14720 - Revision : 12 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response little endian andx attempt RuleID : 14719 - Revision : 12 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response unicode little endian andx attempt RuleID : 14718 - Revision : 12 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response WriteAndX unicode little endian andx attempt RuleID : 14717 - Revision : 12 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response WriteAndX unicode attempt RuleID : 14716 - Revision : 10 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response WriteAndX attempt RuleID : 14715 - Revision : 10 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response unicode attempt RuleID : 14714 - Revision : 10 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response attempt RuleID : 14713 - Revision : 10 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response WriteAndX little endian attempt RuleID : 14712 - Revision : 10 - Type : NETBIOS |
2014-01-10 | SMB spoolss EnumJobs response little endian attempt RuleID : 14711 - Revision : 10 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP spoolss EnumJobs attempt RuleID : 14710 - Revision : 20 - Type : OS-WINDOWS |
2014-01-10 | SMB spoolss EnumJobs response WriteAndX unicode little endian attempt RuleID : 14709 - Revision : 10 - Type : NETBIOS |
2014-01-10 | DCERPC NCACN-IP-TCP spoolss EnumJobs attempt RuleID : 14661 - Revision : 17 - Type : NETBIOS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-04-03 | Name : The remote web server may allow remote code execution. File : iis_7_pci.nasl - Type : ACT_GATHER_INFO |
2008-10-15 | Name : It is possible to execute arbitrary code on the remote host via the internet ... File : smb_nt_ms08-062.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:13:16 |
|
2024-11-28 12:15:15 |
|
2021-02-06 12:03:51 |
|
2020-11-24 09:22:42 |
|
2020-11-24 01:31:12 |
|
2020-11-24 00:22:46 |
|
2020-11-23 21:23:12 |
|
2020-05-23 00:21:28 |
|
2019-07-06 00:19:18 |
|
2019-07-04 12:02:12 |
|
2019-03-18 12:01:40 |
|
2019-02-26 17:19:30 |
|
2018-10-31 00:19:51 |
|
2018-10-13 00:22:39 |
|
2017-09-29 09:23:28 |
|
2017-08-08 09:23:58 |
|
2016-09-01 01:01:11 |
|
2016-06-28 17:12:58 |
|
2016-04-26 17:14:57 |
|
2014-02-17 10:44:22 |
|
2014-01-19 21:24:53 |
|
2013-11-11 12:37:52 |
|
2013-05-11 00:13:16 |
|