Vulnerability Details : CVE-2008-6903
Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a "fuzzed" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2008-6903
- cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows-nt:*:*:*:*:*
- cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows_9x:*:*:*:*:*
- cpe:2.3:a:sophos:anti-virus:4.9.18:*:os_x:*:*:*:*:*
- cpe:2.3:a:sophos:anti-virus:4.37.0:*:netware:*:*:*:*:*
- cpe:2.3:a:sophos:anti-virus:6.4.5:*:linux:*:*:*:*:*
- cpe:2.3:a:sophos:anti-virus:7.0.5:*:unix:*:*:*:*:*
- cpe:2.3:a:sophos:anti-virus7.6.3:*:windows:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-6903
1.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-6903
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2008-6903
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-6903
-
http://www.securityfocus.com/bid/32748
-
http://www.vupen.com/english/advisories/2008/3458
Vendor Advisory
-
http://marc.info/?l=bugtraq&m=122893252316489&w=2
-
http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html
Traficomin Kyberturvallisuuskeskus | Kyberturvallisuuskeskus
-
http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html
Patch
-
http://www.securitytracker.com/id?1021476
Patch
-
http://www.sophos.com/support/knowledgebase/article/50611.html
Patch;Vendor Advisory
Jump to