// For flags

CVE-2008-3177

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Sophos virus detection engine 2.75 on Linux and Unix, as used in Sophos Email Appliance, Pure Message for Unix, and Sophos Anti-Virus Interface (SAVI), allows remote attackers to cause a denial of service (engine crash) via zero-length MIME attachments.

El motor de detección de Sophos 2.75 en Linux y Unix, descubierto en Sophos Email Appliance, Pure Message para Unix y Sophos Anti-Virus Interface (SAVI), permite a los atacantes remotos provocar una denegación de servicio (caída del engine) a través del adjunto MIME de longitud cero

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-07-15 CVE Reserved
  • 2008-07-15 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-16: Configuration
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sophos
Search vendor "Sophos"
Es1000
Search vendor "Sophos" for product "Es1000"
*-
Affected
in Sophos
Search vendor "Sophos"
Email Appliance
Search vendor "Sophos" for product "Email Appliance"
es1000
Search vendor "Sophos" for product "Email Appliance" and version "es1000"
-
Safe
Sophos
Search vendor "Sophos"
Es1000
Search vendor "Sophos" for product "Es1000"
*-
Affected
in Sophos
Search vendor "Sophos"
Email Appliance
Search vendor "Sophos" for product "Email Appliance"
es4000
Search vendor "Sophos" for product "Email Appliance" and version "es4000"
-
Safe
Sophos
Search vendor "Sophos"
Es4000
Search vendor "Sophos" for product "Es4000"
*-
Affected
in Sophos
Search vendor "Sophos"
Email Appliance
Search vendor "Sophos" for product "Email Appliance"
es1000
Search vendor "Sophos" for product "Email Appliance" and version "es1000"
-
Safe
Sophos
Search vendor "Sophos"
Es4000
Search vendor "Sophos" for product "Es4000"
*-
Affected
in Sophos
Search vendor "Sophos"
Email Appliance
Search vendor "Sophos" for product "Email Appliance"
es4000
Search vendor "Sophos" for product "Email Appliance" and version "es4000"
-
Safe
Sophos
Search vendor "Sophos"
Sophos Anti-virus
Search vendor "Sophos" for product "Sophos Anti-virus"
*-
Affected
in Sophos
Search vendor "Sophos"
Email Appliance
Search vendor "Sophos" for product "Email Appliance"
es1000
Search vendor "Sophos" for product "Email Appliance" and version "es1000"
-
Safe
Sophos
Search vendor "Sophos"
Sophos Anti-virus
Search vendor "Sophos" for product "Sophos Anti-virus"
*-
Affected
in Sophos
Search vendor "Sophos"
Email Appliance
Search vendor "Sophos" for product "Email Appliance"
es4000
Search vendor "Sophos" for product "Email Appliance" and version "es4000"
-
Safe
Sophos
Search vendor "Sophos"
Sophos Puremessage Anti-virus
Search vendor "Sophos" for product "Sophos Puremessage Anti-virus"
*-
Affected
in Sophos
Search vendor "Sophos"
Email Appliance
Search vendor "Sophos" for product "Email Appliance"
es1000
Search vendor "Sophos" for product "Email Appliance" and version "es1000"
-
Safe
Sophos
Search vendor "Sophos"
Sophos Puremessage Anti-virus
Search vendor "Sophos" for product "Sophos Puremessage Anti-virus"
*-
Affected
in Sophos
Search vendor "Sophos"
Email Appliance
Search vendor "Sophos" for product "Email Appliance"
es4000
Search vendor "Sophos" for product "Email Appliance" and version "es4000"
-
Safe