CVE-2008-0532
Cisco User-Changeable Password (UCP) 3.3.4.12.5 - 'CSuserCGI.exe' Multiple Remote Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors.
Múltiples desbordamientos de buffer en el módulo securecgi-bin/CSuserCGI.exe de User-Changeable Password (UCP) en versiones anteriores a la 4.2 de Cisco Secure Access Control Server (ACS)para Windows y ACS Solution Engine, permite a atacantes remotos ejecutar código de su elección, mediante la utilización de argumentos largos localizados a continuación del argumento Logout y posiblemente a través de otros vectores no especificados.
The Cisco Secure Access Control Server (ACS) for Windows User-Changeable Password (UCP) application suffers from buffer overflow and cross site scripting vulnerabilities. Details provided.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-01-31 CVE Reserved
- 2008-03-12 First Exploit
- 2008-03-13 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/3743 | Third Party Advisory | |
http://securitytracker.com/id?1019608 | Vdb Entry | |
http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt | X_refsource_misc | |
http://www.securityfocus.com/archive/1/489463/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2008/0868 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41154 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/31394 | 2008-03-12 | |
http://www.securityfocus.com/bid/28222 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/29351 | 2018-10-15 | |
http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml | 2018-10-15 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Acs For Windows Search vendor "Cisco" for product "Acs For Windows" | * | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Acs Solution Engine Search vendor "Cisco" for product "Acs Solution Engine" | * | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | User Changeable Password Search vendor "Cisco" for product "User Changeable Password" | 4.1 Search vendor "Cisco" for product "User Changeable Password" and version "4.1" | - |
Affected
|