CVE-2008-2245
Microsoft Windows - InternalOpenColorProfile Heap Overflow (PoC) (MS08-046)
Severity Score
9.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Heap-based buffer overflow in the InternalOpenColorProfile function in mscms.dll in Microsoft Windows Image Color Management System (MSCMS) in the Image Color Management (ICM) component on Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted image file.
Un desbordamiento de búfer en la región heap de la memoria en la función InternalOpenColorProfile en la biblioteca mscms.dll en Windows Image Color Management System (MSCMS) de Microsoft en el componente Image Color Management (ICM) sobre Windows 2000 SP4, XP SP2 y SP3 y Server 2003 SP1 y SP2, permiten a los atacantes remotos ejecutar código arbitrario por medio de un archivo de imagen diseñado.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-05-16 CVE Reserved
- 2008-08-13 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2024-11-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=742 | Third Party Advisory | |
http://www.securitytracker.com/id?1020675 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA08-225A.html | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5923 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/6732 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/31385 | 2018-10-12 | |
http://www.kb.cert.org/vuls/id/309739 | 2018-10-12 | |
http://www.securityfocus.com/bid/30594 | 2018-10-12 |
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=121915960406986&w=2 | 2018-10-12 | |
http://www.vupen.com/english/advisories/2008/2350 | 2018-10-12 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-046 | 2018-10-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2000 Search vendor "Microsoft" for product "Windows 2000" | * | sp4 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | * | sp1 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | * | sp2 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp3 |
Affected
|