Vulnerability Details : CVE-2008-0532
Potential exploit
Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors.
Vulnerability category: Execute code
Products affected by CVE-2008-0532
- cpe:2.3:a:cisco:acs_solution_engine:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:user_changeable_password:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:acs_for_windows:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-0532
78.89%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-0532
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-0532
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0532
-
http://www.vupen.com/english/advisories/2008/0868
-
http://securitytracker.com/id?1019608
-
http://securityreason.com/securityalert/3743
-
http://www.securityfocus.com/archive/1/489463/100/0/threaded
-
http://secunia.com/advisories/29351
Patch;Vendor Advisory
-
http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml
Patch
-
http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt
-
http://www.securityfocus.com/bid/28222
Exploit;Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41154
Jump to