CVE-2008-2928

Current Description

Multiple buffer overflows in the adminutil library in CGI applications in Red Hat Directory Server 7.1 before SP7 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted Accept-Language HTTP header.

Basic Data

PublishedAugust 29, 2008
Last ModifiedSeptember 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-119
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatDirectory Server7.1sp1******
    2.3ApplicationRedhatDirectory Server7.1sp2******
    2.3ApplicationRedhatDirectory Server7.1sp3******
    2.3ApplicationRedhatDirectory Server7.1sp4******
    2.3ApplicationRedhatDirectory Server7.1sp5******
    2.3ApplicationRedhatDirectory Server7.1sp6******

Vulnerable Software List

VendorProductVersions
Redhat Directory Server 7.1

References

NameSourceURLTags
SSRT080113http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861HP
31565http://secunia.com/advisories/31565SECUNIA
31702http://secunia.com/advisories/31702SECUNIA
31777http://secunia.com/advisories/31777SECUNIA
1020771http://securitytracker.com/id?1020771SECTRACK
http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.htmlhttp://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.htmlCONFIRM
30869http://www.securityfocus.com/bid/30869BIDPatch
ADV-2008-2480http://www.vupen.com/english/advisories/2008/2480VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=453916https://bugzilla.redhat.com/show_bug.cgi?id=453916CONFIRM
rhds-acceptlanguage-bo(44738)https://exchange.xforce.ibmcloud.com/vulnerabilities/44738XF
oval:org.mitre.oval:def:5865https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5865OVAL
RHSA-2008:0596https://rhn.redhat.com/errata/RHSA-2008-0596.htmlREDHATPatch
FEDORA-2008-7642https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.htmlFEDORA
FEDORA-2008-7339https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.htmlFEDORA