Vulnerability Details : CVE-2008-3862
Stack-based buffer overflow in CGI programs in the server in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1374, and 8.0 SP1 Patch 1 before build 3110, allows remote attackers to execute arbitrary code via an HTTP POST request containing crafted form data, related to "parsing CGI requests."
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2008-3862
Probability of exploitation activity in the next 30 days: 54.96%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-3862
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
[email protected] |
CWE ids for CVE-2008-3862
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2008-3862
-
http://securityreason.com/securityalert/4489
-
http://www.vupen.com/english/advisories/2008/2892
-
http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_sp1p1_CriticalPatch_B3110_readme.txt
Patch
-
http://www.securityfocus.com/bid/31859
-
http://www.securitytracker.com/id?1021093
-
http://www.securityfocus.com/archive/1/497650/100/0/threaded
-
http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_CriticalPatch_B1374_readme.txt
Patch
Products affected by CVE-2008-3862
- cpe:2.3:a:trend_micro:officescan:7.3:*:*:*:*:*:*:*
- cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*