CVE-2008-0003
Published Jan 8, 2008
Last updated 6 years ago
Overview
- Description
- Stack-based buffer overflow in the PAMBasicAuthenticator::PAMCallback function in OpenPegasus CIM management server (tog-pegasus), when compiled to use PAM and without PEGASUS_USE_PAM_STANDALONE_PROC defined, might allow remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2007-5360.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "49EF5B77-9BC9-4AE8-A677-48E5E576BE63" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36389D32-61C1-4487-8399-FA7D2864FACD" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "49B67F74-AF8F-4A27-AA8A-A8479E256A9F" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:as:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9E17C039-50DC-487F-B800-8694C2E733FA" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:es:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B380DA56-B6E4-4735-A66C-EE29B56D7A52" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openpegasus:management_server:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "718022C2-CA80-44CB-ACF9-A24FBF5ABDA6" } ], "operator": "OR" } ], "operator": "AND" } ]