Vulnerability Details : CVE-2008-3159
Integer overflow in ds.dlm, as used by dhost.exe, in Novell eDirectory 8.7.3.10 before 8.7.3 SP10b and 8.8 before 8.8.2 ftf2 allows remote attackers to execute arbitrary code via unspecified vectors that trigger a stack-based buffer overflow, related to "flawed arithmetic."
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2008-3159
Probability of exploitation activity in the next 30 days: 28.51%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-3159
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-3159
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3159
-
http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43589
-
http://www.vupen.com/english/advisories/2008/1999
-
http://www.zerodayinitiative.com/advisories/ZDI-08-041/
-
http://www.securityfocus.com/bid/30085
-
http://securitytracker.com/id?1020431
Products affected by CVE-2008-3159
- cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.8:*:*:*:*:*:*:*