Vulnerability Details : CVE-2008-1055
Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2008-1055
- cpe:2.3:a:netwin:surgemail:*:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:1.9:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:1.9b2:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:1.8b3:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:1.8d:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.0e:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.0g2:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.1a:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:1.8a:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.0a2:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.0c:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:1.8g3:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.1c7:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.2a6:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:1.8e:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.2g3:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:3.0c2:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:3.8f3:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.2c10:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.2c9:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:2.2g2:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:3.0a:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:39a:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgemail:beta_39a:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:webmail:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1055
89.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1055
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-1055
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1055
-
http://www.vupen.com/english/advisories/2008/0678
-
http://www.securitytracker.com/id?1019500
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/40833
-
http://securityreason.com/securityalert/3705
-
http://www.securityfocus.com/archive/1/488741/100/0/threaded
-
http://aluigi.altervista.org/adv/surgemailz-adv.txt
-
http://www.securityfocus.com/bid/27990
Exploit
Jump to