Vulnerabilites related to clientsoftware - wincome_mpd_total
Vulnerability from fkie_nvd
Published
2008-11-18 21:30
Modified
2025-04-09 00:30
Severity ?
Summary
Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to bypass authentication and perform administrative actions via vectors involving "simply skipping the auth stage."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clientsoftware | wincome_mpd_total | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clientsoftware:wincome_mpd_total:*:*:*:*:*:*:*:*", "matchCriteriaId": "66AD5DD7-ADE0-46C8-84B7-17A3C476F223", "versionEndIncluding": "3.0.2.623", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to bypass authentication and perform administrative actions via vectors involving \"simply skipping the auth stage.\"" }, { "lang": "es", "value": "aplicaci\u00f3n Client Software WinCom LPD Total v3.0.2.623 y anteriores, permite a atacantes remotos evitar la autenticaci\u00f3n y realizar acciones de administrador a trav\u00e9s de vectores que involucran \"simply skipping the auth stage.\" (simplemente evitar el paso de autenticaci\u00f3n)" } ], "id": "CVE-2008-5158", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-11-18T21:30:00.593", "references": [ { "source": "cve@mitre.org", "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "source": "cve@mitre.org", "url": "http://aluigi.org/poc/wincomalpd.zip" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28763" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4610" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/27614" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/poc/wincomalpd.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4610" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0410" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-11-18 21:30
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clientsoftware | wincome_mpd_total | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clientsoftware:wincome_mpd_total:*:*:*:*:*:*:*:*", "matchCriteriaId": "66AD5DD7-ADE0-46C8-84B7-17A3C476F223", "versionEndIncluding": "3.0.2.623", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption." }, { "lang": "es", "value": "Desbordamiento de entero en el protocolo de administraci\u00f3n remota en Client Software WinCom LPD Total v3.0.2.623 y anteriores, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una cadena larga con un argumento de gran longitud que lanza una corrupci\u00f3n de memoria." } ], "id": "CVE-2008-5159", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-11-18T21:30:00.627", "references": [ { "source": "cve@mitre.org", "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "source": "cve@mitre.org", "url": "http://aluigi.org/poc/wincomalpd.zip" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28763" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4610" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/27614" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/poc/wincomalpd.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4610" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0410" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2008-5159 (GCVE-0-2008-5159)
Vulnerability from cvelistv5
Published
2008-11-18 21:00
Modified
2024-08-07 10:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption.
References
▼ | URL | Tags |
---|---|---|
http://aluigi.org/adv/wincomalpd-adv.txt | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/487507/100/200/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0410 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/28763 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27614 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/4610 | third-party-advisory, x_refsource_SREASON | |
http://aluigi.org/poc/wincomalpd.zip | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:40:17.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "name": "20080204 Multiple vulnerabilities in WinCom LPD Total 3.0.2.623", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "name": "ADV-2008-0410", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0410" }, { "name": "28763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28763" }, { "name": "27614", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27614" }, { "name": "4610", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4610" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/poc/wincomalpd.zip" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "name": "20080204 Multiple vulnerabilities in WinCom LPD Total 3.0.2.623", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "name": "ADV-2008-0410", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0410" }, { "name": "28763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28763" }, { "name": "27614", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27614" }, { "name": "4610", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4610" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/poc/wincomalpd.zip" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5159", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://aluigi.org/adv/wincomalpd-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "name": "20080204 Multiple vulnerabilities in WinCom LPD Total 3.0.2.623", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "name": "ADV-2008-0410", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0410" }, { "name": "28763", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28763" }, { "name": "27614", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27614" }, { "name": "4610", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4610" }, { "name": "http://aluigi.org/poc/wincomalpd.zip", "refsource": "MISC", "url": "http://aluigi.org/poc/wincomalpd.zip" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5159", "datePublished": "2008-11-18T21:00:00", "dateReserved": "2008-11-18T00:00:00", "dateUpdated": "2024-08-07T10:40:17.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5158 (GCVE-0-2008-5158)
Vulnerability from cvelistv5
Published
2008-11-18 21:00
Modified
2024-08-07 10:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to bypass authentication and perform administrative actions via vectors involving "simply skipping the auth stage."
References
▼ | URL | Tags |
---|---|---|
http://aluigi.org/adv/wincomalpd-adv.txt | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/487507/100/200/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0410 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/28763 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27614 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/4610 | third-party-advisory, x_refsource_SREASON | |
http://aluigi.org/poc/wincomalpd.zip | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:40:17.309Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "name": "20080204 Multiple vulnerabilities in WinCom LPD Total 3.0.2.623", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "name": "ADV-2008-0410", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0410" }, { "name": "28763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28763" }, { "name": "27614", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27614" }, { "name": "4610", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4610" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/poc/wincomalpd.zip" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to bypass authentication and perform administrative actions via vectors involving \"simply skipping the auth stage.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "name": "20080204 Multiple vulnerabilities in WinCom LPD Total 3.0.2.623", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "name": "ADV-2008-0410", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0410" }, { "name": "28763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28763" }, { "name": "27614", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27614" }, { "name": "4610", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4610" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/poc/wincomalpd.zip" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5158", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to bypass authentication and perform administrative actions via vectors involving \"simply skipping the auth stage.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://aluigi.org/adv/wincomalpd-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/wincomalpd-adv.txt" }, { "name": "20080204 Multiple vulnerabilities in WinCom LPD Total 3.0.2.623", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487507/100/200/threaded" }, { "name": "ADV-2008-0410", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0410" }, { "name": "28763", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28763" }, { "name": "27614", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27614" }, { "name": "4610", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4610" }, { "name": "http://aluigi.org/poc/wincomalpd.zip", "refsource": "MISC", "url": "http://aluigi.org/poc/wincomalpd.zip" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5158", "datePublished": "2008-11-18T21:00:00", "dateReserved": "2008-11-18T00:00:00", "dateUpdated": "2024-08-07T10:40:17.309Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }