Vulnerability Details : CVE-2008-2654
Potential exploit
Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.
Vulnerability category: OverflowExecute code
Products affected by CVE-2008-2654
- cpe:2.3:a:lavrsen:motion:*:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:lavrsen:motion:3.2.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-2654
9.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-2654
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-2654
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2654
-
http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff
Exploit
-
http://marc.info/?l=oss-security&m=121314329424538&w=2
'Re: [oss-security] exploitability of off-by-one in motion webserver' - MARCExploit
-
http://marc.info/?l=oss-security&m=121314089321816&w=2
'Re: [oss-security] exploitability of off-by-one in motion webserver' - MARC
-
http://security.gentoo.org/glsa/glsa-200807-02.xml
Motion: Execution of arbitrary code (GLSA 200807-02) — Gentoo security
-
http://marc.info/?l=oss-security&m=121311577731820&w=2
'[oss-security] exploitability of off-by-one in motion webserver' - MARC
-
http://secunia.com/advisories/30544
About Secunia Research | FlexeraVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/42979
Motion read_client function buffer overflow CVE-2008-2654 Vulnerability Report
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572
#484572 - CVE-2008-2654: motion off-by-one in webhttpd.c - Debian Bug report logsExploit
-
http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff
Exploit
-
http://marc.info/?l=oss-security&m=121314471626034&w=2
'Re: [oss-security] exploitability of off-by-one in motion webserver' - MARC
-
http://secunia.com/advisories/30864
About Secunia Research | Flexera
-
http://www.securityfocus.com/bid/29636
Patch
-
http://www.vupen.com/english/advisories/2008/1796
Site en construction
Jump to