Vulnerability Name: CVE-2008-1446 (CCN-45545) Assigned: 2008-10-14 Published: 2008-10-14 Updated: 2020-11-23 Summary: Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability." CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C )6.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-190 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2008-1446 Source: HP Type: Issue Tracking, Third Party AdvisorySSRT080143 Source: CCN Type: SA32248Microsoft Windows IIS IPP Service Integer Overflow Vulnerability Source: SECUNIA Type: Third Party Advisory32248 Source: CCN Type: SECTRACK ID: 1021048Microsft Internet Information Server Integer Overflow in Internet Printing Protocol Lets Remote Users Execute Arbitrary Code Source: CCN Type: ASA-2008-419MS08-062 Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155) Source: CCN Type: US-CERT VU#793233Microsoft Windows Internet Printing Protocol service integer overflow Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#793233 Source: CCN Type: Microsoft Security Bulletin MS08-062Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155) Source: BID Type: Third Party Advisory, VDB Entry31682 Source: CCN Type: BID-31682Microsoft Windows Internet Printing Service Integer Overflow Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry1021048 Source: CERT Type: Third Party Advisory, US Government ResourceTA08-288A Source: VUPEN Type: Third Party AdvisoryADV-2008-2813 Source: MS Type: Patch, Vendor AdvisoryMS08-062 Source: XF Type: Third Party Advisory, VDB Entrywin-ipp-service-code-execution(45545) Source: XF Type: UNKNOWNwin-ipp-service-code-execution(45545) Source: XF Type: Third Party Advisory, VDB Entrywin-ms08kb953155-update(45548) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:5764 Vulnerable Configuration: Configuration 1 :cpe:/a:microsoft:internet_information_services:*:*:*:*:*:*:*:* (Version >= 5.0 and <= 7.0)AND cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:* OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:* OR cpe:/o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:* Configuration CCN 1 :cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:-:*:x64:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:*:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
microsoft internet information services *
microsoft windows 2000 - sp4
microsoft windows server 2003 - sp2
microsoft windows server 2003 - sp2
microsoft windows server 2003 - sp2
microsoft windows xp - sp2
microsoft windows xp - sp2
microsoft windows xp - sp3
microsoft windows 2000 - sp4
microsoft windows xp -
microsoft windows 2003_server
microsoft windows xp sp2
microsoft windows 2003_server sp1
microsoft windows 2003_server sp1_itanium
microsoft windows vista *
microsoft windows server_2003 sp2
microsoft windows server_2003 sp2
microsoft windows server_2003 sp2
microsoft windows vista -
microsoft windows xp sp2
microsoft windows vista - sp1
microsoft windows vista - sp1
microsoft windows server 2008 -
microsoft windows server 2008 -
microsoft windows server 2008 -
microsoft windows xp sp3