Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-1054
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-27 Feb, 2008 | 19:44
Updated At-11 Oct, 2018 | 20:29

Stack-based buffer overflow in the _lib_spawn_user_getpid function in (1) swatch.exe and (2) surgemail.exe in NetWin SurgeMail 38k4 and earlier, and beta 39a, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe and unspecified other CGI executables, which triggers an overflow when assigning values to environment variables. NOTE: some of these details are obtained from third party information.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.4MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:P
CPE Matches

netwin
netwin
>>surgemail>>1.8a
cpe:2.3:a:netwin:surgemail:1.8a:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8b3
cpe:2.3:a:netwin:surgemail:1.8b3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8d
cpe:2.3:a:netwin:surgemail:1.8d:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8e
cpe:2.3:a:netwin:surgemail:1.8e:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.8g3
cpe:2.3:a:netwin:surgemail:1.8g3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.9
cpe:2.3:a:netwin:surgemail:1.9:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>1.9b2
cpe:2.3:a:netwin:surgemail:1.9b2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.0a2
cpe:2.3:a:netwin:surgemail:2.0a2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.0c
cpe:2.3:a:netwin:surgemail:2.0c:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.0e
cpe:2.3:a:netwin:surgemail:2.0e:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.0g2
cpe:2.3:a:netwin:surgemail:2.0g2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.1a
cpe:2.3:a:netwin:surgemail:2.1a:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.1c7
cpe:2.3:a:netwin:surgemail:2.1c7:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2a6
cpe:2.3:a:netwin:surgemail:2.2a6:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2c9
cpe:2.3:a:netwin:surgemail:2.2c9:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2c10
cpe:2.3:a:netwin:surgemail:2.2c10:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2g2
cpe:2.3:a:netwin:surgemail:2.2g2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>2.2g3
cpe:2.3:a:netwin:surgemail:2.2g3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.0a
cpe:2.3:a:netwin:surgemail:3.0a:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.0c2
cpe:2.3:a:netwin:surgemail:3.0c2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.1s
cpe:2.3:a:netwin:surgemail:3.1s:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.8f3
cpe:2.3:a:netwin:surgemail:3.8f3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.8i
cpe:2.3:a:netwin:surgemail:3.8i:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.8i2
cpe:2.3:a:netwin:surgemail:3.8i2:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>3.8i3
cpe:2.3:a:netwin:surgemail:3.8i3:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>38k
cpe:2.3:a:netwin:surgemail:38k:*:*:*:*:*:*:*
netwin
netwin
>>surgemail>>38k4
cpe:2.3:a:netwin:surgemail:38k4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://aluigi.altervista.org/adv/surgemailz-adv.txtcve@mitre.org
Exploit
http://secunia.com/advisories/29105cve@mitre.org
Vendor Advisory
http://securityreason.com/securityalert/3705cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/488741/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/27992cve@mitre.org
Exploit
http://www.securitytracker.com/id?1019500cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/0678cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/40834cve@mitre.org
N/A
Change History
0Changes found

Details not found