Vulnerability Details : CVE-2008-6085
Integer overflow in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, when configured to scan inside compressed archives, allows remote attackers to execute arbitrary code via a crafted RPM compressed archive file, which triggers a buffer overflow.
Vulnerability category: OverflowExecute code
Products affected by CVE-2008-6085
- cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:2008:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:7.02:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:2009:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:second:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2008:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:second:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:7.02:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2009:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.52:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.53:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.30:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.30:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.52:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.11:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_business:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_business:3.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_consumers:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_consumers:6.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_consumers:5.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_consumers:7.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_client_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_client_security:7.11:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_linux_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_home_server_security:2009:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_windows_servers:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_citrix_servers:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:6.62:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:7.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_gatekeeper_for_windows:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_gatekeeper_for_linux:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_mimesweeper:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_messaging_security_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_messaging_security_gateway:4.0.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-6085
11.58%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-6085
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
CWE ids for CVE-2008-6085
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-6085
-
http://www.f-secure.com/security/fsc-2008-3.shtml
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/31846
-
http://www.securitytracker.com/id?1021073
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/46016
-
http://www.vupen.com/english/advisories/2008/2874
-
http://secunia.com/advisories/32352
Vendor Advisory
Jump to