Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-3466
Modified
More InfoOfficial Page
Source-secure@microsoft.com
View Known Exploited Vulnerability (KEV) details
Published At-15 Oct, 2008 | 00:12
Updated At-12 Oct, 2018 | 21:48

Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Microsoft Corporation
microsoft
>>host_integration_server_2000>>*
cpe:2.3:a:microsoft:host_integration_server_2000:*:*:*:*:client:*:*:*
Microsoft Corporation
microsoft
>>host_integration_server_2000>>*
cpe:2.3:a:microsoft:host_integration_server_2000:*:sp2:*:*:server:*:*:*
Microsoft Corporation
microsoft
>>host_integration_server_2004>>*
cpe:2.3:a:microsoft:host_integration_server_2004:*:*:*:*:client:*:*:*
Microsoft Corporation
microsoft
>>host_integration_server_2004>>*
cpe:2.3:a:microsoft:host_integration_server_2004:*:*:*:*:server:*:*:*
Microsoft Corporation
microsoft
>>host_integration_server_2004>>*
cpe:2.3:a:microsoft:host_integration_server_2004:*:sp1:*:*:server:*:*:*
Microsoft Corporation
microsoft
>>host_integration_server_2006>>*
cpe:2.3:a:microsoft:host_integration_server_2006:*:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>host_integration_server_2006>>*
cpe:2.3:a:microsoft:host_integration_server_2006:*:*:*:*:*:*:x86:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=745secure@microsoft.com
N/A
http://marc.info/?l=bugtraq&m=122479227205998&w=2secure@microsoft.com
N/A
http://secunia.com/advisories/32233secure@microsoft.com
Patch
Vendor Advisory
http://www.securityfocus.com/bid/31620secure@microsoft.com
Exploit
Patch
http://www.securitytracker.com/id?1021043secure@microsoft.com
N/A
http://www.us-cert.gov/cas/techalerts/TA08-288A.htmlsecure@microsoft.com
US Government Resource
http://www.vupen.com/english/advisories/2008/2810secure@microsoft.com
N/A
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-059secure@microsoft.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6075secure@microsoft.com
N/A
Change History
0Changes found

Details not found