var-200803-0422
Vulnerability from variot
Unspecified vulnerability in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, allows remote attackers to execute arbitrary code or cause a denial of service (hang or crash) via a malformed archive that triggers an unhandled exception, as demonstrated by the PROTOS GENOME test suite for Archive Formats. Multiple F-Secure products are prone to multiple remote archive-handling vulnerabilities because the applications fails to properly handle malformed archive files. Successfully exploiting these issues allows remote attackers to trigger unhandled exceptions. Various unspecified effects (potentially including denial of service or remote code execution) are possible. The malformed archive triggers an exception that cannot be handled, such as the PROTOS GENOME test that matches the Archive format. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: F-Secure Archives Handling Unspecified Vulnerabilities
SECUNIA ADVISORY ID: SA29397
VERIFY ADVISORY: http://secunia.com/advisories/29397/
CRITICAL: Highly critical
IMPACT: DoS, System access
WHERE:
From remote
OPERATING SYSTEM: F-Secure Messaging Security Gateway X-Series http://secunia.com/product/8997/ F-Secure Messaging Security Gateway P-Series http://secunia.com/product/8998/
SOFTWARE: F-Secure Internet Security 2006 http://secunia.com/product/6883/ F-Secure Internet Security 2007 http://secunia.com/product/14375/ F-Secure Internet Security 2008 http://secunia.com/product/17555/ F-Secure Anti-Virus 2006 http://secunia.com/product/6882/ F-Secure Anti-Virus 2007 http://secunia.com/product/14374/ F-Secure Anti-Virus 2008 http://secunia.com/product/17554/ F-Secure Anti-Virus Client Security 7.x http://secunia.com/product/14381/ F-Secure Anti-Virus Client Security 6.x http://secunia.com/product/5786/ F-Secure Anti-Virus for Workstations 7.x http://secunia.com/product/14226/ F-Secure Anti-Virus Linux Client Security 5.x http://secunia.com/product/14377/ F-Secure Anti-Virus for Linux 4.x http://secunia.com/product/3165/ F-Secure Anti-Virus for Windows Servers 7.x http://secunia.com/product/14382/ F-Secure Anti-Virus for Windows Servers 5.x http://secunia.com/product/452/ F-Secure Anti-Virus Client Security 5.x http://secunia.com/product/2718/ F-Secure Anti-Virus for Workstations 5.x http://secunia.com/product/457/ F-Secure Anti-Virus for Citrix Servers 5.x http://secunia.com/product/5198/ F-Secure Anti-Virus Linux Server Security 5.x http://secunia.com/product/14376/ F-Secure Anti-Virus for Microsoft Exchange 7.x http://secunia.com/product/14551/ F-Secure Anti-Virus for Microsoft Exchange 6.x http://secunia.com/product/454/ F-Secure Internet Gatekeeper 6.x http://secunia.com/product/3339/ F-Secure Internet Gatekeeper for Linux 2.x http://secunia.com/product/4635/ F-Secure Anti-Virus for MIMEsweeper 5.x http://secunia.com/product/455/
DESCRIPTION: Some vulnerabilities have been reported in various F-Secure products, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
The vulnerabilities are caused due to unspecified errors within the handling of archives.
The vulnerabilities affect the following products:
- F-Secure Internet Security 2006, 2007, 2007 Second Edition, and 2008
- F-Secure Anti-Virus 2006, 2007, 2007 Second Edition, and 2008
- F-Secure Client Security 7.11 and earlier
- F-Secure Anti-Virus Client Security 6.04 and earlier
- F-Secure Anti-Virus for Workstations 7.11 and earlier
- F-Secure Anti-Virus Linux Client Security 5.54 and earlier
- F-Secure Anti-Virus for Linux 4.65 and earlier
- Solutions based on F-Secure Protection Service for Consumers version 7.00 and earlier
- Solutions based on F-Secure Protection Service for Business version 3.10 and earlier
- F-Secure Mobile Anti-Virus\x99 for S60 2nd edition
- F-Secure Mobile Anti-Virus\x99 for Windows Mobile 2003/5.0/6
- F-Secure Mobile Security\x99 for Series 80
- F-Secure Anti-Virus for Windows Servers 7.01 and earlier
- F-Secure Anti-Virus for Citrix Servers 7.00 and earlier
- F-Secure Anti-Virus Linux Server Security 5.54 and earlier
- F-Secure Anti-Virus for Microsoft Exchange 7.10 and earlier
- F-Secure Internet Gatekeeper 6.61, Windows and earlier
- F-Secure Internet Gatekeeper for Linux 2.16 and earlier
- F-Secure Anti-Virus for MIMEsweeper 5.61 and earlier
- F-Secure Messaging Security Gateway 4.0.7 and earlier
SOLUTION: Apply patches. Please see the vendor's advisory for details.
PROVIDED AND/OR DISCOVERED BY: The vendor credits University of Oulu.
ORIGINAL ADVISORY: http://www.f-secure.com/security/fsc-2008-2.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200803-0422", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "f-secure mobile antivirus for windows mobile", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "6" }, { "model": "f-secure mobile antivirus for windows mobile", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "5.0" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2007" }, { "model": "f-secure anti-virus client security", "scope": "lte", "trust": 1.0, "vendor": "f secure", "version": "6.04" }, { "model": "f-secure protection service for consumers", "scope": "lte", "trust": 1.0, "vendor": "f secure", "version": "7.00" }, { "model": "f-secure anti-virus for linux", "scope": "lte", "trust": 1.0, "vendor": "f secure", "version": "4.65" }, { "model": "f-secure protection service for business", "scope": "lte", "trust": 1.0, "vendor": "f secure", "version": "3.10" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2008" }, { "model": "f-secure anti-virus linux client security", "scope": "lte", "trust": 1.0, "vendor": "f secure", "version": "5.54" }, { "model": "f-secure internet security", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2006" }, { "model": "f-secure internet security", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2007" }, { "model": "f-secure internet security", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2008" }, { "model": "f-secure mobile antivirus for s60", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2nd_edition" }, { "model": "f-secure mobile antivirus for windows mobile", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2003" }, { "model": "f-secure client security", "scope": "lte", "trust": 1.0, "vendor": "f secure", "version": "7.11" }, { "model": "f-secure mobile security for series 80", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "*" }, { "model": "f-secure anti-virus for workstations", "scope": "lte", "trust": 1.0, "vendor": "f secure", "version": "7.11" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2006" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 0.8, "vendor": "f secure", "version": "2006 to 2008" }, { "model": "f-secure internet security", "scope": "eq", "trust": 0.8, "vendor": "f secure", "version": "2006 to 2008" }, { "model": "f-secure anti-virus client security", "scope": "eq", "trust": 0.6, "vendor": "f secure", "version": "6.04" }, { "model": "f-secure mobile security for series 80", "scope": null, "trust": 0.6, "vendor": "f secure", "version": null }, { "model": "f-secure anti-virus for workstations", "scope": "eq", "trust": 0.6, "vendor": "f secure", "version": "7.11" }, { "model": "f-secure anti-virus for linux", "scope": "eq", "trust": 0.6, "vendor": "f secure", "version": "4.65" }, { "model": "f-secure protection service for business", "scope": "eq", "trust": 0.6, "vendor": "f secure", "version": "3.10" }, { "model": "f-secure protection service for consumers", "scope": "eq", "trust": 0.6, "vendor": "f secure", "version": "7.00" }, { "model": "f-secure client security", "scope": "eq", "trust": 0.6, "vendor": "f secure", "version": "7.11" }, { "model": "f-secure anti-virus linux client security", "scope": "eq", "trust": 0.6, "vendor": "f secure", "version": "5.54" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.64" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.60" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2.16" }, { "model": "anti-virus linux client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.11" }, { "model": "anti-virus for linux gateways", "scope": null, "trust": 0.3, "vendor": "f secure", "version": null }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.41" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.50" }, { "model": "anti-virus for citrix servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.52" }, { "model": "anti-virus linux client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.54" }, { "model": "protection service for business", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.10" }, { "model": "anti-virus second edition", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2007" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.65" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.50" }, { "model": "anti-virus for mimesweeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.42" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.2" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.43" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2008" }, { "model": "anti-virus for linux servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.64" }, { "model": "anti-virus for citrix servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.00" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.61" }, { "model": "anti-virus for mimesweeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.61" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.61" }, { "model": "anti-virus linux client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.0.4" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.04" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.40" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.32" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.02" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.11" }, { "model": "internet gatekeeper for linux", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2.16" }, { "model": "internet security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2008" }, { "model": "internet gatekeeper for linux", "scope": null, "trust": 0.3, "vendor": "f secure", "version": null }, { "model": "internet gatekeeper for linux", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2.14" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.30" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.11" }, { "model": "anti-virus for linux", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.52" }, { "model": "anti-virus linux client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.0" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.31" }, { "model": "protection service for consumers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "0" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.60" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.51" }, { "model": "mobile anti-virus for s60 2nd edition", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "0" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.40" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.41" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.42" }, { "model": "anti-virus for linux servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.65" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.11" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.10" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.03" }, { "model": "anti-virus for linux servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.61" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.62" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.00" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.01" }, { "model": "internet gatekeeper for linux", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2.06" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.400" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "0" }, { "model": "anti-virus linux client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.52" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.44" }, { "model": "anti-virus for mimesweeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.50" }, { "model": "anti-virus for linux servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.51" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.54" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2007" }, { "model": "protection service for business", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "0" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.3" }, { "model": "anti-virus for mimesweeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.41" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.61" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.52" }, { "model": "internet security second edition", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2007" }, { "model": "internet security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "20060" }, { "model": "messaging security gateway", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.0.6" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.21" }, { "model": "messaging security gateway", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.0.7" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.31" }, { "model": "anti-virus for linux", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.5" }, { "model": "protection service for consumers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.00" }, { "model": "mobile security for series", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "800" }, { "model": "anti-virus linux client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.01" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.00" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.52" }, { "model": "anti-virus for linux servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.52" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.55" }, { "model": "mobile anti-virus for windows mobile", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2003/5.0/60" }, { "model": "anti-virus for ms exchange service release", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.301" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "20060" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.01" }, { "model": "anti-virus linux client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.30" }, { "model": "anti-virus for citrix servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.5" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.42" }, { "model": "internet security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "20070" }, { "model": "anti-virus for mimesweeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.51" }, { "model": "internet gatekeeper for linux", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2.15.484" } ], "sources": [ { "db": "BID", "id": "28282" }, { "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "db": "CNNVD", "id": "CNNVD-200803-344" }, { "db": "NVD", "id": "CVE-2008-1412" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:f-secure:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-secure:f-secure_internet_security", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002870" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor credits the University of Oulu for discovering these issues.", "sources": [ { "db": "BID", "id": "28282" }, { "db": "CNNVD", "id": "CNNVD-200803-344" } ], "trust": 0.9 }, "cve": "CVE-2008-1412", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2008-1412", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-31537", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-1412", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-1412", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200803-344", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-31537", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2008-1412", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-31537" }, { "db": "VULMON", "id": "CVE-2008-1412" }, { "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "db": "CNNVD", "id": "CNNVD-200803-344" }, { "db": "NVD", "id": "CVE-2008-1412" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, allows remote attackers to execute arbitrary code or cause a denial of service (hang or crash) via a malformed archive that triggers an unhandled exception, as demonstrated by the PROTOS GENOME test suite for Archive Formats. Multiple F-Secure products are prone to multiple remote archive-handling vulnerabilities because the applications fails to properly handle malformed archive files. \nSuccessfully exploiting these issues allows remote attackers to trigger unhandled exceptions. Various unspecified effects (potentially including denial of service or remote code execution) are possible. The malformed archive triggers an exception that cannot be handled, such as the PROTOS GENOME test that matches the Archive format. ----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nF-Secure Archives Handling Unspecified Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA29397\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/29397/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nF-Secure Messaging Security Gateway X-Series\nhttp://secunia.com/product/8997/\nF-Secure Messaging Security Gateway P-Series\nhttp://secunia.com/product/8998/\n\nSOFTWARE:\nF-Secure Internet Security 2006\nhttp://secunia.com/product/6883/\nF-Secure Internet Security 2007\nhttp://secunia.com/product/14375/\nF-Secure Internet Security 2008\nhttp://secunia.com/product/17555/\nF-Secure Anti-Virus 2006\nhttp://secunia.com/product/6882/\nF-Secure Anti-Virus 2007\nhttp://secunia.com/product/14374/\nF-Secure Anti-Virus 2008\nhttp://secunia.com/product/17554/\nF-Secure Anti-Virus Client Security 7.x\nhttp://secunia.com/product/14381/\nF-Secure Anti-Virus Client Security 6.x\nhttp://secunia.com/product/5786/\nF-Secure Anti-Virus for Workstations 7.x\nhttp://secunia.com/product/14226/\nF-Secure Anti-Virus Linux Client Security 5.x\nhttp://secunia.com/product/14377/\nF-Secure Anti-Virus for Linux 4.x\nhttp://secunia.com/product/3165/\nF-Secure Anti-Virus for Windows Servers 7.x\nhttp://secunia.com/product/14382/\nF-Secure Anti-Virus for Windows Servers 5.x\nhttp://secunia.com/product/452/\nF-Secure Anti-Virus Client Security 5.x\nhttp://secunia.com/product/2718/\nF-Secure Anti-Virus for Workstations 5.x\nhttp://secunia.com/product/457/\nF-Secure Anti-Virus for Citrix Servers 5.x\nhttp://secunia.com/product/5198/\nF-Secure Anti-Virus Linux Server Security 5.x\nhttp://secunia.com/product/14376/\nF-Secure Anti-Virus for Microsoft Exchange 7.x\nhttp://secunia.com/product/14551/\nF-Secure Anti-Virus for Microsoft Exchange 6.x\nhttp://secunia.com/product/454/\nF-Secure Internet Gatekeeper 6.x\nhttp://secunia.com/product/3339/\nF-Secure Internet Gatekeeper for Linux 2.x\nhttp://secunia.com/product/4635/\nF-Secure Anti-Virus for MIMEsweeper 5.x\nhttp://secunia.com/product/455/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in various F-Secure products,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService) or to potentially compromise a vulnerable system. \n\nThe vulnerabilities are caused due to unspecified errors within the\nhandling of archives. \n\nThe vulnerabilities affect the following products:\n\n* F-Secure Internet Security 2006, 2007, 2007 Second Edition, and\n2008\n* F-Secure Anti-Virus 2006, 2007, 2007 Second Edition, and 2008\n* F-Secure Client Security 7.11 and earlier\n* F-Secure Anti-Virus Client Security 6.04 and earlier\n* F-Secure Anti-Virus for Workstations 7.11 and earlier\n* F-Secure Anti-Virus Linux Client Security 5.54 and earlier\n* F-Secure Anti-Virus for Linux 4.65 and earlier\n* Solutions based on F-Secure Protection Service for Consumers\nversion 7.00 and earlier\n* Solutions based on F-Secure Protection Service for Business version\n3.10 and earlier\n* F-Secure Mobile Anti-Virus\\x99 for S60 2nd edition\n* F-Secure Mobile Anti-Virus\\x99 for Windows Mobile 2003/5.0/6\n* F-Secure Mobile Security\\x99 for Series 80\n* F-Secure Anti-Virus for Windows Servers 7.01 and earlier\n* F-Secure Anti-Virus for Citrix Servers 7.00 and earlier\n* F-Secure Anti-Virus Linux Server Security 5.54 and earlier\n* F-Secure Anti-Virus for Microsoft Exchange 7.10 and earlier\n* F-Secure Internet Gatekeeper 6.61, Windows and earlier\n* F-Secure Internet Gatekeeper for Linux 2.16 and earlier\n* F-Secure Anti-Virus for MIMEsweeper 5.61 and earlier\n* F-Secure Messaging Security Gateway 4.0.7 and earlier\n\nSOLUTION:\nApply patches. Please see the vendor\u0027s advisory for details. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits University of Oulu. \n\nORIGINAL ADVISORY:\nhttp://www.f-secure.com/security/fsc-2008-2.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-1412" }, { "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "db": "BID", "id": "28282" }, { "db": "VULHUB", "id": "VHN-31537" }, { "db": "VULMON", "id": "CVE-2008-1412" }, { "db": "PACKETSTORM", "id": "64615" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-1412", "trust": 2.9 }, { "db": "BID", "id": "28282", "trust": 2.1 }, { "db": "SECUNIA", "id": "29397", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2008-0903", "trust": 1.7 }, { "db": "SECTRACK", "id": "1019618", "trust": 1.7 }, { "db": "SECTRACK", "id": "1019619", "trust": 1.7 }, { "db": "SECTRACK", "id": "1019620", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-002870", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200803-344", "trust": 0.7 }, { "db": "XF", "id": "41234", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-31537", "trust": 0.1 }, { "db": "VUPEN", "id": "2008/0903", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2008-1412", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "64615", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31537" }, { "db": "VULMON", "id": "CVE-2008-1412" }, { "db": "BID", "id": "28282" }, { "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "db": "PACKETSTORM", "id": "64615" }, { "db": "CNNVD", "id": "CNNVD-200803-344" }, { "db": "NVD", "id": "CVE-2008-1412" } ] }, "id": "VAR-200803-0422", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-31537" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:09:40.962000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security advisories", "trust": 0.8, "url": "http://www.f-secure.com/en/web/labs_global/security-advisories" }, { "title": "RADAMSA", "trust": 0.1, "url": "https://github.com/StephenHaruna/RADAMSA " }, { "title": "radamsa", "trust": 0.1, "url": "https://github.com/Hwangtaewon/radamsa " }, { "title": "radamsa-Fuzzer", "trust": 0.1, "url": "https://github.com/sunzu94/radamsa-Fuzzer " }, { "title": "radamsa", "trust": 0.1, "url": "https://github.com/benoit-a/radamsa " } ], "sources": [ { "db": "VULMON", "id": "CVE-2008-1412" }, { "db": "JVNDB", "id": "JVNDB-2008-002870" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31537" }, { "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "db": "NVD", "id": "CVE-2008-1412" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.f-secure.com/security/fsc-2008-2.shtml" }, { "trust": 2.1, "url": "http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-cs-hotfixes.shtml" }, { "trust": 2.1, "url": "http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-mimesweeper-hotfixes.shtml" }, { "trust": 2.1, "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "trust": 2.1, "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/28282" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id?1019618" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id?1019619" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id?1019620" }, { "trust": 1.8, "url": "http://secunia.com/advisories/29397" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/0903/references" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41234" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1412" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1412" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0903/references" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/41234" }, { "trust": 0.3, "url": "http://www.f-secure.com/cs/" }, { "trust": 0.3, "url": "http://www.f-secure.com/products/anti-virus/linux/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/stephenharuna/radamsa" }, { "trust": 0.1, "url": "http://secunia.com/product/457/" }, { "trust": 0.1, "url": "http://secunia.com/product/454/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/29397/" }, { "trust": 0.1, "url": "http://secunia.com/product/2718/" }, { "trust": 0.1, "url": "http://secunia.com/product/455/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/14377/" }, { "trust": 0.1, "url": "http://secunia.com/product/452/" }, { "trust": 0.1, "url": "http://secunia.com/product/6883/" }, { "trust": 0.1, "url": "http://secunia.com/product/5786/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "http://secunia.com/product/14382/" }, { "trust": 0.1, "url": "http://secunia.com/product/3339/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/17554/" }, { "trust": 0.1, "url": "http://secunia.com/product/5198/" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/8997/" }, { "trust": 0.1, "url": "http://secunia.com/product/14374/" }, { "trust": 0.1, "url": "http://secunia.com/product/17555/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6882/" }, { "trust": 0.1, "url": "http://secunia.com/product/8998/" }, { "trust": 0.1, "url": "http://secunia.com/product/14376/" }, { "trust": 0.1, "url": "http://secunia.com/product/14375/" }, { "trust": 0.1, "url": "http://secunia.com/product/3165/" }, { "trust": 0.1, "url": "http://secunia.com/product/4635/" }, { "trust": 0.1, "url": "http://secunia.com/product/14226/" }, { "trust": 0.1, "url": "http://secunia.com/product/14381/" }, { "trust": 0.1, "url": "http://secunia.com/product/14551/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-31537" }, { "db": "VULMON", "id": "CVE-2008-1412" }, { "db": "BID", "id": "28282" }, { "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "db": "PACKETSTORM", "id": "64615" }, { "db": "CNNVD", "id": "CNNVD-200803-344" }, { "db": "NVD", "id": "CVE-2008-1412" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-31537" }, { "db": "VULMON", "id": "CVE-2008-1412" }, { "db": "BID", "id": "28282" }, { "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "db": "PACKETSTORM", "id": "64615" }, { "db": "CNNVD", "id": "CNNVD-200803-344" }, { "db": "NVD", "id": "CVE-2008-1412" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-03-20T00:00:00", "db": "VULHUB", "id": "VHN-31537" }, { "date": "2008-03-20T00:00:00", "db": "VULMON", "id": "CVE-2008-1412" }, { "date": "2008-03-17T00:00:00", "db": "BID", "id": "28282" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "date": "2008-03-17T18:28:30", "db": "PACKETSTORM", "id": "64615" }, { "date": "2008-03-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-344" }, { "date": "2008-03-20T10:44:00", "db": "NVD", "id": "CVE-2008-1412" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-31537" }, { "date": "2017-08-08T00:00:00", "db": "VULMON", "id": "CVE-2008-1412" }, { "date": "2015-05-07T17:32:00", "db": "BID", "id": "28282" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-002870" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-344" }, { "date": "2024-11-21T00:44:28.933000", "db": "NVD", "id": "CVE-2008-1412" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200803-344" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural F-Secure Service disruption in anti-virus products (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002870" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200803-344" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.