CVE-2008-0003
tog-pegasus pam authentication buffer overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the PAMBasicAuthenticator::PAMCallback function in OpenPegasus CIM management server (tog-pegasus), when compiled to use PAM and without PEGASUS_USE_PAM_STANDALONE_PROC defined, might allow remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2007-5360.
Un desbordamiento del búfer en la región stack de la memoria en la función PAMBasicAuthenticator::PAMCallback en el servidor de administración de OpenPegasus CIM (tog-pegasus), cuando es compilado para usar PAM y sin PEGASUS_USE_PAM_STANDALONE_PROC definida, podría permitir a atacantes remotos ejecutar código arbitrario por medio de vectores desconocidos, una vulnerabilidad diferente de CVE -2007-5360.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-12-03 CVE Reserved
- 2008-01-08 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (25)
URL | Tag | Source |
---|---|---|
http://lists.vmware.com/pipermail/security-announce/2008/000014.html | Mailing List | |
http://osvdb.org/40082 | Vdb Entry | |
http://securitytracker.com/id?1019159 | Vdb Entry | |
http://www.attrition.org/pipermail/vim/2008-January/001879.html | Mailing List | |
http://www.securityfocus.com/archive/1/490917/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/27172 | Vdb Entry | |
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4129 | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39527 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10282 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2008-0002.html | 2018-10-15 | |
http://www.securityfocus.com/bid/27188 | 2018-10-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openpegasus Search vendor "Openpegasus" | Management Server Search vendor "Openpegasus" for product "Management Server" | 2.6.1 Search vendor "Openpegasus" for product "Management Server" and version "2.6.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 4.0 Search vendor "Redhat" for product "Enterprise Linux" and version "4.0" | as |
Safe
|
Openpegasus Search vendor "Openpegasus" | Management Server Search vendor "Openpegasus" for product "Management Server" | 2.6.1 Search vendor "Openpegasus" for product "Management Server" and version "2.6.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 4.0 Search vendor "Redhat" for product "Enterprise Linux" and version "4.0" | es |
Safe
|
Openpegasus Search vendor "Openpegasus" | Management Server Search vendor "Openpegasus" for product "Management Server" | 2.6.1 Search vendor "Openpegasus" for product "Management Server" and version "2.6.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 4.0 Search vendor "Redhat" for product "Enterprise Linux" and version "4.0" | ws |
Safe
|
Openpegasus Search vendor "Openpegasus" | Management Server Search vendor "Openpegasus" for product "Management Server" | 2.6.1 Search vendor "Openpegasus" for product "Management Server" and version "2.6.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 4.5.z Search vendor "Redhat" for product "Enterprise Linux" and version "4.5.z" | as |
Safe
|
Openpegasus Search vendor "Openpegasus" | Management Server Search vendor "Openpegasus" for product "Management Server" | 2.6.1 Search vendor "Openpegasus" for product "Management Server" and version "2.6.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 4.5.z Search vendor "Redhat" for product "Enterprise Linux" and version "4.5.z" | es |
Safe
|
Openpegasus Search vendor "Openpegasus" | Management Server Search vendor "Openpegasus" for product "Management Server" | 2.6.1 Search vendor "Openpegasus" for product "Management Server" and version "2.6.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 4.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "4.0" | - |
Safe
|
Openpegasus Search vendor "Openpegasus" | Management Server Search vendor "Openpegasus" for product "Management Server" | 2.6.1 Search vendor "Openpegasus" for product "Management Server" and version "2.6.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 5.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "5.0" | - |
Safe
|