Vulnerability Details : CVE-2008-1391
Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2008-1391
Probability of exploitation activity in the next 30 days: 2.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 88 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-1391
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-1391
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-1391
-
Red Hat 2009-09-24Red Hat does not consider this to be a security issue. Properly written application should not use arbitrary untrusted data as part of the format string passed to functions as strfmon or printf family functions.
- http://support.apple.com/kb/HT3338
-
http://www.debian.org/security/2010/dsa-2058
Debian -- Security Information -- DSA-2058-1 glibc, eglibc
-
https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
[security-announce] SUSE Security Announcement: glibc (SUSE-SA:2010:052)
-
http://securityreason.com/achievement_securityalert/53
Exploit
- http://www.vupen.com/english/advisories/2008/3444
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41504
- http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
-
http://securityreason.com/securityalert/3770
Exploit
-
http://www.us-cert.gov/cas/techalerts/TA08-350A.html
US Government Resource
-
http://www.securityfocus.com/archive/1/490158/100/0/threaded
-
http://www.securityfocus.com/bid/28479
-
http://www.securitytracker.com/id?1019722
- cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:7.0:pre-release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:7.0_releng:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.0_p5_release:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:7.0_beta4:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*