Vulnerability Details : CVE-2008-6898
Public exploit exists!
Buffer overflow in the XHTTP Module 4.1.0.0 in the ActiveX control for SaschArt SasCam Webcam Server 2.6.5 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long argument to the Get method and other unspecified methods.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2008-6898
- cpe:2.3:a:saschart:sascam_webcam_server:2.6.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-6898
66.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2008-6898
-
SasCam Webcam Server v.2.6.5 Get() Method Buffer Overflow
Disclosure Date: 2008-12-29First seen: 2020-04-26exploit/windows/fileformat/sascam_getThe SasCam Webcam Server ActiveX control is vulnerable to a buffer overflow. By passing an overly long argument via the Get method, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the user. This control is not
CVSS scores for CVE-2008-6898
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-6898
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-6898
-
https://www.exploit-db.com/exploits/7617
-
http://www.securityfocus.com/bid/33053
SaschArt SasCam Webcam Server ActiveX Control 'Get' Method Buffer Overflow VulnerabilityExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/47654
-
http://www.exploit-db.com/exploits/14195
Jump to