Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-2654

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2008-2654
Last Modified 07 Mar 2011 10:09:33
Published 13 Jun 2008 02:41:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-2654

Summary

Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.

Vulnerable Systems

Application

  • Lavrsen Motion 3.1.17

  • Lavrsen Motion 3.1.18

  • Lavrsen Motion 3.1.19

  • Lavrsen Motion 3.1.20

  • Lavrsen Motion 3.2.1

  • Lavrsen Motion 3.2.10

  • Lavrsen Motion 3.2.2

  • Lavrsen Motion 3.2.3

  • Lavrsen Motion 3.2.4

  • Lavrsen Motion 3.2.5

  • Lavrsen Motion 3.2.6

  • Lavrsen Motion 3.2.7

  • Lavrsen Motion 3.2.8

  • Lavrsen Motion 3.2.9


References

BID - 29636

XF - motion-readclient-bo(42979)

VUPEN - ADV-2008-1796

CONFIRM - http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff

CONFIRM - http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff

GENTOO - GLSA-200807-02

SECUNIA - 30864

SECUNIA - 30544

MLIST - [oss-security] 20080611 Re: exploitability of off-by-one in motion webserver

MLIST - [oss-security] 20080610 Re: exploitability of off-by-one in motion webserver

MLIST - [oss-security] 20080610 exploitability of off-by-one in motion webserver

CONFIRM - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572


Last Updated: 27 May 2016 10:47:56