Vulnerability Name: | CVE-2008-3684 (CCN-53824) | ||||||||
Assigned: | 2008-08-14 | ||||||||
Published: | 2008-08-14 | ||||||||
Updated: | 2009-11-23 | ||||||||
Summary: | Heap-based buffer overflow in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to execute arbitrary code via crafted packet data to TCP port 2606. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-3684 Source: CCN Type: SA37070 EMC Documentum ApplicationXtender Admin Agent Two Vulnerabilities Source: SECUNIA Type: Vendor Advisory 37070 Source: CCN Type: EMC Web site Documentum Product Family from EMC Source: CCN Type: OSVDB ID: 59065 EMC Documentum ApplicationXtender Admin Agent (aws_tmxn.exe) TCP Packet Handling Remote Overflow Source: CCN Type: BID-36735 EMC Documentum ApplicationXtender Admin Agent Multiple Vulnerabilities Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-08-096/ Source: XF Type: UNKNOWN applicationxtender-awstmxn-bo(53824) Source: CCN Type: ZDI-08-096 EMC ApplicationXtender Workflow Server Admin Agent Heap Overflow Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |