Vulnerability Name:

CVE-2008-1446 (CCN-45545)

Assigned:2008-10-14
Published:2008-10-14
Updated:2020-11-23
Summary:Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-1446

Source: HP
Type: Issue Tracking, Third Party Advisory
SSRT080143

Source: CCN
Type: SA32248
Microsoft Windows IIS IPP Service Integer Overflow Vulnerability

Source: SECUNIA
Type: Third Party Advisory
32248

Source: CCN
Type: SECTRACK ID: 1021048
Microsft Internet Information Server Integer Overflow in Internet Printing Protocol Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: ASA-2008-419
MS08-062 Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155)

Source: CCN
Type: US-CERT VU#793233
Microsoft Windows Internet Printing Protocol service integer overflow

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#793233

Source: CCN
Type: Microsoft Security Bulletin MS08-062
Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155)

Source: BID
Type: Third Party Advisory, VDB Entry
31682

Source: CCN
Type: BID-31682
Microsoft Windows Internet Printing Service Integer Overflow Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1021048

Source: CERT
Type: Third Party Advisory, US Government Resource
TA08-288A

Source: VUPEN
Type: Third Party Advisory
ADV-2008-2813

Source: MS
Type: Patch, Vendor Advisory
MS08-062

Source: XF
Type: Third Party Advisory, VDB Entry
win-ipp-service-code-execution(45545)

Source: XF
Type: UNKNOWN
win-ipp-service-code-execution(45545)

Source: XF
Type: Third Party Advisory, VDB Entry
win-ms08kb953155-update(45548)

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:5764

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:internet_information_services:*:*:*:*:*:*:*:* (Version >= 5.0 and <= 7.0)
  • AND
  • cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*
  • OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
  • OR cpe:/o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5764
    V
    Integer Overflow in IPP Service Vulnerability
    2011-12-05
    BACK
    microsoft internet information services *
    microsoft windows 2000 - sp4
    microsoft windows server 2003 - sp2
    microsoft windows server 2003 - sp2
    microsoft windows server 2003 - sp2
    microsoft windows xp - sp2
    microsoft windows xp - sp2
    microsoft windows xp - sp3
    microsoft windows 2000 - sp4
    microsoft windows xp -
    microsoft windows 2003_server
    microsoft windows xp sp2
    microsoft windows 2003_server sp1
    microsoft windows 2003_server sp1_itanium
    microsoft windows vista *
    microsoft windows server_2003 sp2
    microsoft windows server_2003 sp2
    microsoft windows server_2003 sp2
    microsoft windows vista -
    microsoft windows xp sp2
    microsoft windows vista - sp1
    microsoft windows vista - sp1
    microsoft windows server 2008 -
    microsoft windows server 2008 -
    microsoft windows server 2008 -
    microsoft windows xp sp3