Vulnerability Details : CVE-2008-0888
The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2008-0888
- cpe:2.3:a:info-zip:unzip:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-0888
9.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-0888
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-0888
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0888
-
http://www.vupen.com/english/advisories/2008/0913/references
Site en constructionVendor Advisory
-
http://www.vmware.com/security/advisories/VMSA-2008-0009.html
VMSA-2008-0009.2
-
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:068
Mandriva
-
http://www.securityfocus.com/archive/1/493080/100/0/threaded
-
http://www.securityfocus.com/bid/28288
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0116
-
http://www.vupen.com/english/advisories/2008/1744
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
-
https://issues.rpath.com/browse/RPL-2317
-
http://www.securitytracker.com/id?1019634
GoDaddy Domain Name Search
-
http://www.ubuntu.com/usn/usn-589-1
500: Server error | Ubuntu
-
http://wiki.rpath.com/Advisories:rPSA-2008-0116
-
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
[security-announce] SUSE Security Summary Report SUSE-SR:2008:007 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://security.gentoo.org/glsa/glsa-200804-06.xml
UnZip: User-assisted execution of arbitrary code (GLSA 200804-06) — Gentoo security
-
http://support.apple.com/kb/HT4077
About the security content of Security Update 2010-002 / Mac OS X v10.6.3 - Apple Support
-
http://www.securityfocus.com/archive/1/489967/100/0/threaded
-
http://www.redhat.com/support/errata/RHSA-2008-0196.html
SupportVendor Advisory
-
http://www.ipcop.org/index.php?name=News&file=article&sid=40
Just a moment...
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41246
UnZip inflate_dynamic() code execution CVE-2008-0888 Vulnerability Report
-
http://www.debian.org/security/2008/dsa-1522
[SECURITY] [DSA 1522-1] New xwine packages fix several vulnerabilities
-
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Apple - Lists.apple.com
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9733
404 Not Found
Jump to