Executive Summary

Informations
Name CVE-2008-1498 First vendor Publication 2008-03-25
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in the IMAP service in NetWin Surgemail 3.8k4-4 and earlier allows remote authenticated users to execute arbitrary code via a long first argument to the LIST command.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1498

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 91

Open Source Vulnerability Database (OSVDB)

Id Description
43853 SurgeMail IMAP Service LIST Command Argument Handling Remote Overflow

Sources (Detail)

http://secunia.com/advisories/29105
http://www.netwinsite.com/surgemail/help/updates.htm
http://www.securityfocus.com/bid/28260
http://www.vupen.com/english/advisories/2008/0901/references
https://www.exploit-db.com/exploits/5259
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 23:14:45
  • Multiple Updates
2024-11-28 12:15:16
  • Multiple Updates
2021-05-05 01:04:38
  • Multiple Updates
2021-05-04 12:07:20
  • Multiple Updates
2021-04-22 01:07:44
  • Multiple Updates
2020-05-23 01:39:18
  • Multiple Updates
2020-05-23 00:21:29
  • Multiple Updates
2017-09-29 09:23:29
  • Multiple Updates
2016-04-26 17:15:29
  • Multiple Updates
2013-05-11 00:13:32
  • Multiple Updates