CVE-2008-4250
Published Oct 23, 2008
Last updated 3 years ago
Overview
- Description
- The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "E3C43D05-40F8-4769-BA6B-A376420EA972" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43D64F8D-975A-4A5B-BEDF-D27D65C96A29" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:-:*:itanium:*", "vulnerable": true, "matchCriteriaId": "8856A97B-4C43-45E5-B1DB-89EB9C350265" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*", "vulnerable": true, "matchCriteriaId": "9F98AE07-3995-4501-9804-FEA5A87ADFAD" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:itanium:*", "vulnerable": true, "matchCriteriaId": "87842DF1-F3AC-4585-A117-904B936D5C9F" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*", "vulnerable": true, "matchCriteriaId": "3A118DC8-CD3A-461F-867E-5174F24FBAE9" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*", "vulnerable": true, "matchCriteriaId": "1114016B-B51D-495D-96AC-A0E7992DA551" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "51160A46-6768-44D5-89CD-6DB9D2268A2E" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*", "vulnerable": true, "matchCriteriaId": "889F98DA-4266-470B-AE3D-480BDF6BADB9" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*", "vulnerable": true, "matchCriteriaId": "4902A7BD-0645-4CAC-8EA8-24BD2D8B893A" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", "vulnerable": true, "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ], "operator": "OR" } ] } ]