CVE-2008-3252
Debian Linux Security Advisory 1622-1
Severity Score
9.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Stack-based buffer overflow in the read_article function in getarticle.c in newsx 1.6 allows remote attackers to execute arbitrary code via a news article containing a large number of lines starting with a period.
Desbordamiento de búfer basado en pila en la función read_article en getarticle.c en newsx 1.6, permite a atacantes remotos ejecutar código de su elección a través de un artículo de noticias que contiene un gran número de líneas que empiezan con un período.
It was discovered that newsx, an NNTP news exchange utility, was affected by a buffer overflow allowing remote attackers to execute arbitrary code via a news article containing a large number of lines starting with a period.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-07-21 CVE Reserved
- 2008-07-21 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/31307 | Third Party Advisory | |
http://www.securityfocus.com/bid/30231 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43844 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=454483 | 2017-08-08 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/31080 | 2017-08-08 | |
http://www.debian.org/security/2008/dsa-1622 | 2017-08-08 | |
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00485.html | 2017-08-08 | |
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00565.html | 2017-08-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fedora Search vendor "Fedora" | Newsx Search vendor "Fedora" for product "Newsx" | 1.6 Search vendor "Fedora" for product "Newsx" and version "1.6" | 8.fc8 |
Affected
| in | Redhat Search vendor "Redhat" | Fedora Search vendor "Redhat" for product "Fedora" | 8 Search vendor "Redhat" for product "Fedora" and version "8" | - |
Safe
|
Fedora Search vendor "Fedora" | Newsx Search vendor "Fedora" for product "Newsx" | 1.6 Search vendor "Fedora" for product "Newsx" and version "1.6" | 8.fc8 |
Affected
| in | Redhat Search vendor "Redhat" | Fedora Search vendor "Redhat" for product "Fedora" | 9 Search vendor "Redhat" for product "Fedora" and version "9" | - |
Safe
|
Fedora Search vendor "Fedora" | Newsx Search vendor "Fedora" for product "Newsx" | 1.6 Search vendor "Fedora" for product "Newsx" and version "1.6" | 9.fc9 |
Affected
| in | Redhat Search vendor "Redhat" | Fedora Search vendor "Redhat" for product "Fedora" | 8 Search vendor "Redhat" for product "Fedora" and version "8" | - |
Safe
|
Fedora Search vendor "Fedora" | Newsx Search vendor "Fedora" for product "Newsx" | 1.6 Search vendor "Fedora" for product "Newsx" and version "1.6" | 9.fc9 |
Affected
| in | Redhat Search vendor "Redhat" | Fedora Search vendor "Redhat" for product "Fedora" | 9 Search vendor "Redhat" for product "Fedora" and version "9" | - |
Safe
|