Vulnerability Details : CVE-2008-0888
The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2008-0888
Probability of exploitation activity in the next 30 days: 7.19%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-0888
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-0888
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0888
-
http://www.vupen.com/english/advisories/2008/0913/references
Vendor Advisory
-
http://www.vmware.com/security/advisories/VMSA-2008-0009.html
VMSA-2008-0009.2
-
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:068
- http://www.securityfocus.com/archive/1/493080/100/0/threaded
-
http://www.securityfocus.com/bid/28288
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0116
-
http://www.vupen.com/english/advisories/2008/1744
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
-
https://issues.rpath.com/browse/RPL-2317
-
http://www.securitytracker.com/id?1019634
-
http://www.ubuntu.com/usn/usn-589-1
-
http://wiki.rpath.com/Advisories:rPSA-2008-0116
-
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
[security-announce] SUSE Security Summary Report SUSE-SR:2008:007 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://security.gentoo.org/glsa/glsa-200804-06.xml
-
http://support.apple.com/kb/HT4077
About the security content of Security Update 2010-002 / Mac OS X v10.6.3 - Apple Support
-
http://www.securityfocus.com/archive/1/489967/100/0/threaded
-
http://www.redhat.com/support/errata/RHSA-2008-0196.html
Vendor Advisory
- http://www.ipcop.org/index.php?name=News&file=article&sid=40
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41246
-
http://www.debian.org/security/2008/dsa-1522
-
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Apple - Lists.apple.com
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9733
Products affected by CVE-2008-0888
- cpe:2.3:a:info-zip:unzip:*:*:*:*:*:*:*:*