Vulnerability Details : CVE-2008-6085
Integer overflow in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, when configured to scan inside compressed archives, allows remote attackers to execute arbitrary code via a crafted RPM compressed archive file, which triggers a buffer overflow.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2008-6085
Probability of exploitation activity in the next 30 days: 6.17%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-6085
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
CWE ids for CVE-2008-6085
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-6085
Products affected by CVE-2008-6085
- cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:2008:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:7.02:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:2009:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:second:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2008:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:second:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:7.02:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_security:2009:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.52:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.53:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.30:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.30:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.52:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.11:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_business:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_business:3.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_consumers:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_consumers:6.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_consumers:5.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_protection_service_for_consumers:7.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_client_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_client_security:7.11:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_linux_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_home_server_security:2009:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_windows_servers:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_citrix_servers:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:6.62:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:7.00:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_gatekeeper_for_windows:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_internet_gatekeeper_for_linux:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_anti-virus_for_mimesweeper:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_messaging_security_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:f-secure:f-secure_messaging_security_gateway:4.0.7:*:*:*:*:*:*:*