Vulnerability Name: | CVE-2008-1456 (CCN-44078) | ||||||||
Assigned: | 2008-08-12 | ||||||||
Published: | 2008-08-12 | ||||||||
Updated: | 2018-10-30 | ||||||||
Summary: | Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an array of function pointers. | ||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C) 6.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-1456 Source: HP Type: UNKNOWN HPSBST02360 Source: CCN Type: SA31417 Microsoft Windows Event System Privilege Escalation Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 31417 Source: CCN Type: SECTRACK ID: 1020677 Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code Source: CCN Type: Microsoft Security Bulletin MS08-049 Vulnerabilities in Event System Could Allow Remote Code Execution (950974) Source: BID Type: UNKNOWN 30586 Source: CCN Type: BID-30586 Microsoft Windows Event System Array Index Verification Remote Code Execution Vulnerability Source: SECTRACK Type: UNKNOWN 1020677 Source: CERT Type: US Government Resource TA08-225A Source: VUPEN Type: UNKNOWN ADV-2008-2353 Source: MS Type: UNKNOWN MS08-049 Source: XF Type: UNKNOWN event-system-index-code-execution(44078) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:5630 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |