var-200802-0020
Vulnerability from variot
Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders. A local attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
SOLUTION: Apply patches.
Microsoft Windows 2000 Service Pack 4: http://www.microsoft.com/downloads/details.aspx?familyid=b24f34fb-40b9-4aa5-b5ac-e3f0a6062753
Windows XP Professional SP2: http://www.microsoft.com/downloads/details.aspx?familyid=73d24fcf-bea9-4b13-9f1c-4e068c53a4ae
Windows XP Professional x64 Edition (optionally with SP2): http://www.microsoft.com/downloads/details.aspx?familyid=103a6bc0-034a-443d-b1d4-81117820dcb2
Windows Server 2003 SP1 / SP2: http://www.microsoft.com/downloads/details.aspx?familyid=516ef8e8-3cb6-4660-b771-3c7f66917a11
Windows Server 2003 x64 Edition (optionally SP2): http://www.microsoft.com/downloads/details.aspx?familyid=e24fb33c-67b9-4ed4-9317-b5fd535d005a
Windows Server 2003 with SP1/SP2 for Itanium-based systems: http://www.microsoft.com/downloads/details.aspx?familyid=5a4a6083-8c67-4403-8e20-7f2b82178124
Windows Vista: http://www.microsoft.com/downloads/details.aspx?familyid=8c7018ec-ae80-4a30-93fc-0f7386732514
Windows Vista x64 Edition: http://www.microsoft.com/downloads/details.aspx?familyid=4de2fffc-5793-4acf-98ee-1b801e59ae39
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: MS08-005 (KB942831): http://www.microsoft.com/technet/security/Bulletin/MS08-005.mspx
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA08-043C
Microsoft Updates for Multiple Vulnerabilities
Original release date: February 12, 2008 Last revised: February 12, 2008 Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Internet Explorer
* Microsoft Office
* Microsoft Visual Basic
* Microsoft Internet Information Services (IIS)
Overview
Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Office, Visual Basic and Internet Information Services (IIS).
I. Description
Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, Office, Visual Basic and Internet Information Services (IIS) as part of the Microsoft Security Bulletin Summary for February 2008. For more information, see the US-CERT Vulnerability Notes Database.
II.
III. Solution
Apply updates from Microsoft
Microsoft has provided updates for these vulnerabilities in the February 2008 security bulletins. The security bulletins describe any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. Administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS).
IV. References
-
US-CERT Vulnerability Notes for Microsoft February 2008 updates - http://www.kb.cert.org/vuls/byid?searchview&query=ms08-feb
-
Microsoft Security Bulletin Summary for February 2008 - http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx
-
Microsoft Update - https://www.update.microsoft.com/microsoftupdate/
-
Windows Server Update Services - http://www.microsoft.com/windowsserversystem/updateservices/default.mspx
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA08-043C.html>
Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA08-043C Feedback VU#104665" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2008 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
February 12, 2008: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBR7IkKvRFkHkM87XOAQIMdgf/Z4QINqEeDeTdbKj9Jn4K+v5WKr+GWL0R J3C7PfJyQvqnl0ctnqF4DOBvi8xgPXWuhCqh6XEgi7ImkJVxI8HPpy1gj8K9YC5J ZDidLPOPvo3suzeEw3pNX/9oN9sOSsvCxwkzgq3cw7e3/vh69zLJWEg3Mz5Vc0UC lU8u4HLMpDFXzn2NA3/YlTDyc45OV3Z5LCA8GHkqIBzZLZUtprIjIeXBOxbY3pqw Ac9f8FB5c88PHW8+34pXmzt7QXuynW+8yrCuApIc0ZduUpB1+7Pi1aVmDwxxGdSz GUP3Ue8minBwUIyBn3h1jxUwO7nADPToVVLHj8fwHaFXvoNQha8iKg== =imPA -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0020", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iis", "scope": "eq", "trust": 1.7, "vendor": "microsoft", "version": "7.0" }, { "model": "internet information server", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "6.0" }, { "model": "internet information services", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "5.0" }, { "model": "iis", "scope": "eq", "trust": 1.1, "vendor": "microsoft", "version": "6.0" }, { "model": "iis", "scope": "eq", "trust": 1.1, "vendor": "microsoft", "version": "5.1" }, { "model": "iis", "scope": "eq", "trust": 1.1, "vendor": "microsoft", "version": "5.0" }, { "model": "windows 2000", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "none" }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(itanium)" }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64)" }, { "model": "windows vista", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "none" }, { "model": "windows vista", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64)" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64)" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp3" }, { "model": "internet information server", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "5.1" }, { "model": "internet information server", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "5.0" }, { "model": "networks centrex ip client manager", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "9.0" }, { "model": "networks centrex ip client manager", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "10.0" }, { "model": "storage management appliance", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "messaging application server mm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "messaging application server mm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "messaging application server mm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "messaging application server mm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "messaging application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" } ], "sources": [ { "db": "BID", "id": "27101" }, { "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "db": "CNNVD", "id": "CNNVD-200802-227" }, { "db": "NVD", "id": "CVE-2008-0074" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:microsoft:iis", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_2000", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_server_2003", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_vista", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_xp", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001105" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-227" } ], "trust": 0.6 }, "cve": "CVE-2008-0074", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2008-0074", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-0074", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-0074", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200802-227", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "db": "CNNVD", "id": "CNNVD-200802-227" }, { "db": "NVD", "id": "CVE-2008-0074" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\\Root, or WWWRoot folders. \nA local attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. \n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nSOLUTION:\nApply patches. \n\nMicrosoft Windows 2000 Service Pack 4:\nhttp://www.microsoft.com/downloads/details.aspx?familyid=b24f34fb-40b9-4aa5-b5ac-e3f0a6062753\n\nWindows XP Professional SP2:\nhttp://www.microsoft.com/downloads/details.aspx?familyid=73d24fcf-bea9-4b13-9f1c-4e068c53a4ae\n\nWindows XP Professional x64 Edition (optionally with SP2):\nhttp://www.microsoft.com/downloads/details.aspx?familyid=103a6bc0-034a-443d-b1d4-81117820dcb2\n\nWindows Server 2003 SP1 / SP2:\nhttp://www.microsoft.com/downloads/details.aspx?familyid=516ef8e8-3cb6-4660-b771-3c7f66917a11\n\nWindows Server 2003 x64 Edition (optionally SP2):\nhttp://www.microsoft.com/downloads/details.aspx?familyid=e24fb33c-67b9-4ed4-9317-b5fd535d005a\n\nWindows Server 2003 with SP1/SP2 for Itanium-based systems:\nhttp://www.microsoft.com/downloads/details.aspx?familyid=5a4a6083-8c67-4403-8e20-7f2b82178124\n\nWindows Vista:\nhttp://www.microsoft.com/downloads/details.aspx?familyid=8c7018ec-ae80-4a30-93fc-0f7386732514\n\nWindows Vista x64 Edition:\nhttp://www.microsoft.com/downloads/details.aspx?familyid=4de2fffc-5793-4acf-98ee-1b801e59ae39\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nMS08-005 (KB942831):\nhttp://www.microsoft.com/technet/security/Bulletin/MS08-005.mspx\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\t National Cyber Alert System\n\n Technical Cyber Security Alert TA08-043C\n\n\nMicrosoft Updates for Multiple Vulnerabilities\n\n Original release date: February 12, 2008\n Last revised: February 12, 2008\n Source: US-CERT\n\nSystems Affected\n\n * Microsoft Windows\n * Microsoft Internet Explorer\n * Microsoft Office\n * Microsoft Visual Basic\n * Microsoft Internet Information Services (IIS)\n\nOverview\n\n Microsoft has released updates that address critical vulnerabilities\n in Microsoft Windows, Internet Explorer, Office, Visual Basic and\n Internet Information Services (IIS). \n\nI. Description\n\n Microsoft has released updates to address vulnerabilities that affect\n Microsoft Windows, Internet Explorer, Office, Visual Basic and\n Internet Information Services (IIS) as part of the Microsoft Security\n Bulletin Summary for February 2008. For more information, see the US-CERT Vulnerability Notes\n Database. \n\nII. \n\nIII. Solution\n\nApply updates from Microsoft\n\n Microsoft has provided updates for these vulnerabilities in the\n February 2008 security bulletins. The security bulletins describe any\n known issues related to the updates. Administrators are encouraged to\n note these issues and test for any potentially adverse effects. \n Administrators should consider using an automated update distribution\n system such as Windows Server Update Services (WSUS). \n\nIV. References\n\n * US-CERT Vulnerability Notes for Microsoft February 2008 updates - \u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=ms08-feb\u003e\n\n * Microsoft Security Bulletin Summary for February 2008 - \u003chttp://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx\u003e\n\n * Microsoft Update - \u003chttps://www.update.microsoft.com/microsoftupdate/\u003e\n\n * Windows Server Update Services - \u003chttp://www.microsoft.com/windowsserversystem/updateservices/default.mspx\u003e\n\n _________________________________________________________________\n\n The most recent version of this document can be found at:\n\n \u003chttp://www.us-cert.gov/cas/techalerts/TA08-043C.html\u003e\n _________________________________________________________________\n\n Feedback can be directed to US-CERT Technical Staff. Please send\n email to \u003ccert@cert.org\u003e with \"TA08-043C Feedback VU#104665\" in the\n subject. \n _________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n _________________________________________________________________\n\n Produced 2008 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n _________________________________________________________________\n\n Revision History\n\n February 12, 2008: Initial release\n\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBR7IkKvRFkHkM87XOAQIMdgf/Z4QINqEeDeTdbKj9Jn4K+v5WKr+GWL0R\nJ3C7PfJyQvqnl0ctnqF4DOBvi8xgPXWuhCqh6XEgi7ImkJVxI8HPpy1gj8K9YC5J\nZDidLPOPvo3suzeEw3pNX/9oN9sOSsvCxwkzgq3cw7e3/vh69zLJWEg3Mz5Vc0UC\nlU8u4HLMpDFXzn2NA3/YlTDyc45OV3Z5LCA8GHkqIBzZLZUtprIjIeXBOxbY3pqw\nAc9f8FB5c88PHW8+34pXmzt7QXuynW+8yrCuApIc0ZduUpB1+7Pi1aVmDwxxGdSz\nGUP3Ue8minBwUIyBn3h1jxUwO7nADPToVVLHj8fwHaFXvoNQha8iKg==\n=imPA\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0074" }, { "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "db": "BID", "id": "27101" }, { "db": "PACKETSTORM", "id": "63557" }, { "db": "PACKETSTORM", "id": "63559" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0074", "trust": 2.7 }, { "db": "BID", "id": "27101", "trust": 2.7 }, { "db": "USCERT", "id": "TA08-043C", "trust": 2.5 }, { "db": "SECUNIA", "id": "28849", "trust": 2.5 }, { "db": "SECTRACK", "id": "1019384", "trust": 2.4 }, { "db": "VUPEN", "id": "ADV-2008-0507", "trust": 1.6 }, { "db": "USCERT", "id": "SA08-043C", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2008-001105", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200802-227", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "63557", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63559", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "27101" }, { "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "db": "PACKETSTORM", "id": "63557" }, { "db": "PACKETSTORM", "id": "63559" }, { "db": "CNNVD", "id": "CNNVD-200802-227" }, { "db": "NVD", "id": "CVE-2008-0074" } ] }, "id": "VAR-200802-0020", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-11-23T20:23:40.088000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MS08-005", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms08-005.mspx" }, { "title": "MS08-005", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms08-005.mspx" }, { "title": "MS08-005e", "trust": 0.8, "url": "http://www.microsoft.com/japan/security/bulletins/MS08-005e.mspx" }, { "title": "TA08-043C", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-043c.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001105" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-noinfo", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "db": "NVD", "id": "CVE-2008-0074" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://secunia.com/advisories/28849" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/27101" }, { "trust": 2.4, "url": "http://www.securitytracker.com/id?1019384" }, { "trust": 2.4, "url": "http://www.us-cert.gov/cas/techalerts/ta08-043c.html" }, { "trust": 1.6, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-005" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=120361015026386\u0026w=2" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2008/0507/references" }, { "trust": 1.6, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5389" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0074" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2008/0507" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2008/at080003.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta08-043c/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta08-043c/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0074" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa08-043c.html" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/2008/20080214_212436.html" }, { "trust": 0.4, "url": "http://www.microsoft.com/technet/security/bulletin/ms08-005.mspx" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://www.microsoft.com/windowsserver2003/iis/default.mspx" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2008-064.htm" }, { "trust": 0.3, "url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026documentoid=702601\u0026poid=" }, { "trust": 0.1, "url": "http://secunia.com/product/17543/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=8c7018ec-ae80-4a30-93fc-0f7386732514" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28849/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=b24f34fb-40b9-4aa5-b5ac-e3f0a6062753" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=516ef8e8-3cb6-4660-b771-3c7f66917a11" }, { "trust": 0.1, "url": "http://secunia.com/product/39/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=73d24fcf-bea9-4b13-9f1c-4e068c53a4ae" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=5a4a6083-8c67-4403-8e20-7f2b82178124" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=103a6bc0-034a-443d-b1d4-81117820dcb2" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=e24fb33c-67b9-4ed4-9317-b5fd535d005a" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=4de2fffc-5793-4acf-98ee-1b801e59ae39" }, { "trust": 0.1, "url": "http://secunia.com/product/1438/" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta08-043c.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=ms08-feb\u003e" }, { "trust": 0.1, "url": "http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx\u003e" }, { "trust": 0.1, "url": "http://www.microsoft.com/windowsserversystem/updateservices/default.mspx\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "https://www.update.microsoft.com/microsoftupdate/\u003e" } ], "sources": [ { "db": "BID", "id": "27101" }, { "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "db": "PACKETSTORM", "id": "63557" }, { "db": "PACKETSTORM", "id": "63559" }, { "db": "CNNVD", "id": "CNNVD-200802-227" }, { "db": "NVD", "id": "CVE-2008-0074" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "27101" }, { "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "db": "PACKETSTORM", "id": "63557" }, { "db": "PACKETSTORM", "id": "63559" }, { "db": "CNNVD", "id": "CNNVD-200802-227" }, { "db": "NVD", "id": "CVE-2008-0074" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-02-12T00:00:00", "db": "BID", "id": "27101" }, { "date": "2008-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "date": "2008-02-12T22:59:25", "db": "PACKETSTORM", "id": "63557" }, { "date": "2008-02-12T23:07:55", "db": "PACKETSTORM", "id": "63559" }, { "date": "2008-02-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-227" }, { "date": "2008-02-12T21:00:00", "db": "NVD", "id": "CVE-2008-0074" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-03-25T18:00:00", "db": "BID", "id": "27101" }, { "date": "2008-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001105" }, { "date": "2019-07-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-227" }, { "date": "2024-11-21T00:41:06.683000", "db": "NVD", "id": "CVE-2008-0074" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "27101" }, { "db": "PACKETSTORM", "id": "63557" }, { "db": "CNNVD", "id": "CNNVD-200802-227" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft IIS Elevation of Privilege Vulnerability in File Change Notification", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001105" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-227" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.