CVE-2008-1446

Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
References
Link Resource
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Issue Tracking Third Party Advisory
http://secunia.com/advisories/32248 Third Party Advisory
http://www.kb.cert.org/vuls/id/793233 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/31682 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021048 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-288A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2813 Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45545 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45548 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764 Third Party Advisory
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Issue Tracking Third Party Advisory
http://secunia.com/advisories/32248 Third Party Advisory
http://www.kb.cert.org/vuls/id/793233 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/31682 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021048 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-288A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2813 Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45545 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45548 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_information_services:*:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=122479227205998&w=2 - Issue Tracking, Third Party Advisory () http://marc.info/?l=bugtraq&m=122479227205998&w=2 - Issue Tracking, Third Party Advisory
References () http://secunia.com/advisories/32248 - Third Party Advisory () http://secunia.com/advisories/32248 - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/793233 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/793233 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/31682 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/31682 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1021048 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1021048 - Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA08-288A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-288A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2008/2813 - Third Party Advisory () http://www.vupen.com/english/advisories/2008/2813 - Third Party Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45545 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/45545 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45548 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/45548 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764 - Third Party Advisory

Information

Published : 2008-10-15 00:12

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1446

Mitre link : CVE-2008-1446

CVE.ORG link : CVE-2008-1446


JSON object : View

Products Affected

microsoft

  • windows_2000
  • internet_information_services
  • windows_server_2003
  • windows_xp
CWE
CWE-190

Integer Overflow or Wraparound