Vulnerability Details : CVE-2014-5008
Snoopy allows remote attackers to execute arbitrary commands.
Products affected by CVE-2014-5008
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:snoopy:snoopy:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5008
5.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5008
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2014-5008
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5008
-
https://bugzilla.redhat.com/show_bug.cgi?id=1121497
1121497 – (CVE-2008-7313, CVE-2014-5008, CVE-2014-5009) CVE-2008-7313 CVE-2014-5008 CVE-2014-5009 snoopy: incomplete fixes for command execution flawsIssue Tracking;Patch
-
http://www.debian.org/security/2015/dsa-3248
Debian -- Security Information -- DSA-3248-1 libphp-snoopyThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/07/18/2
oss-security - Re: CVE request - Snoopy incomplete fix for CVE-2008-4796Mailing List;Patch;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2017-0212.html
RHSA-2017:0212 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2017-0214.html
RHSA-2017:0214 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264
IBM Security Bulletin: Vulnerabilities in nagios affect PowerKVMThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2017-0213.html
RHSA-2017:0213 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2017-0211.html
RHSA-2017:0211 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/12/21/8
oss-security - Re: Nagios Core < 4.2.2 Curl Command Injection leading to Remote Code Execution [CVE-2016-9565]Mailing List;Patch;Third Party Advisory
-
http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.28
CVS Info for project snoopyPatch;Third Party Advisory
-
http://www.securityfocus.com/bid/68419
Snoopy 'exec()' Arbitrary Command Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2014/07/16/10
oss-security - Re: Re: CVE request - Snoopy incomplete fix for CVE-2008-4796Mailing List;Patch;Third Party Advisory
Jump to