var-200805-0217
Vulnerability from variot

Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438. Attackers can exploit this issue to cause an affected computer to stop responding or to restart. Successful attacks will deny service to legitimate users. ----------------------------------------------------------------------

Secunia Network Software Inspector 2.0 (NSI) - Public Beta

The Public Beta has ended. Thanks to all that participated.

PROVIDED AND/OR DISCOVERED BY: The vendor credits SoWhat, Nevis Labs.

ORIGINAL ADVISORY: MS08-029 (KB952044): http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. Microsoft Malware Protection Engine TWO DoS Vulnerabilities

By Sowhat of Nevis Labs Date: 2008.05.14

http://www.nevisnetworks.com http://secway.org/advisory/AD20080514.txt

CVE: CVE-2008-1437 CVE-2008-1438

Vendor Microsoft

Affected: Windows Live OneCare Microsoft Antigen for Exchange Microsoft Antigen for SMTP Gateway Microsoft Windows Defender Microsoft Forefront Client Security Microsoft Forefront Security for Exchange Server Microsoft Forefront Security for SharePoint Standalone System Sweeper located in Diagnostics and Recovery Toolset 6.0

Details:

There are two vulnerabilities idenitified in Microsoft Antivirus product. These vulnerabilities can be exploited to cause Denial of service.

  1. CVE-2008-1437 PE Parsing Memory Corruption While scanning a specially crafted PE file, Malware orotection engine (MsMpEng.exe/mpengine.dll for Windows Live OneCare) will crash.

Currently, There's no evidence of code execution found.

Please note that this vulnerability can be triggered in various ways: a. by sending emails to target mail server which is protected by MS antivirus b. by sending emails to victim who is using Windows Onecare or Windows Defender. c. by convining the victim to visit some websites. d. by sending files (can be any extension) to victims through P2P/IM.

Real Time protection is enabled by default, so in the case b&c, the vulnerability can be exploited without any further user interaction after the victim recieved the email or opened the website.

  1. CVE-2008-1438 PE Parsing Disk Space D.o.S While parsing a specially crafted file with a malformed "size of header" is scanned by Microsoft Windows OneCare, there will be Disk Space DOS condition.

Microsoft Malware protection engine will allocate disk space as much as the PE file "claimed", It can "eat" several Gb disk space of Windows installation driver.

Proof of Concept: No POC will be released.

Fix: Microsoft has released an update address this issue. http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx

Vendor Response:

2008.04.18 Vendor notified via email 2008.04.18 Vendor response, developing for patch 2008.05.14 Patch Release 2008.05.14 Advisory released

-- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?" . The most severe vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code.

II. Impact

A remote, unauthenticated attacker could execute arbitrary code, gain elevated privileges, or cause a denial of service.

III. Solution

Apply updates from Microsoft

Microsoft has provided updates for these vulnerabilities in the May 2008 Security Bulletin Summary. The security bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. Administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS).

IV. References

 * US-CERT  Vulnerability  Notes  for  Microsoft  May  2008 updates -
   <http://www.kb.cert.org/vuls/byid?searchview&query=ms08-may>
 * Microsoft    Security    Bulletin   Summary   for   May   2008   -
   <http://www.microsoft.com/technet/security/bulletin/ms08-may.mspx>
 * Microsoft Update -
   <https://www.update.microsoft.com/microsoftupdate/>
 * Windows Server Update Services -
   <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

The most recent version of this document can be found at:

 <http://www.us-cert.gov/cas/techalerts/TA08-134A.html>

Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA08-134A Feedback VU#534907" in the subject.


For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.


Produced 2008 by US-CERT, a government organization.

Terms of use:

 <http://www.us-cert.gov/legal.html>

Revision History

May 13, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBSCnrE/RFkHkM87XOAQJAoAf/XrkJlT9AS30/CZwAMO9qta8TbtLQTZR3 /yAV/h2CmOKhFsbjdh8L4+GcP0n66twWhmMBfBs6BosOoaqqhkeJcE6JoyQ2Kso1 MnhXjPJuGtgEPcfYX9bg42rnZ5WDXGh9EuhoZVyUV4UeUQ8qRM8LL3OIWBHubE7R fcOqIVDz/qtCC1U+RUdrbdeV8XB48mshiLoWjxzOT0FzeOKsBwsyHzaO5mAeEy4E 1hsLC2u4idGlq9Ezl82XODyH6vtHBKq7yKDv+FkVHbCqwB+thqPkUo2es+amASra shcJggg39WWmPWphqnBz94rkdwitsvW3ymOWt1F27GecX1sveofLDQ== =rhf4 -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200805-0217",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "malware protection engine",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "microsoft",
        "version": "0.1.13.192"
      },
      {
        "model": "malware protection engine",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "microsoft",
        "version": "1.1.3520.0"
      },
      {
        "model": "diagnostics and recovery toolkit",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": "forefront client security",
        "scope": null,
        "trust": 1.4,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows defender",
        "scope": null,
        "trust": 1.4,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows live onecare",
        "scope": null,
        "trust": 1.4,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows defender",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "*"
      },
      {
        "model": "antigen for exchange",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "*"
      },
      {
        "model": "forefront security for sharepoint",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "*"
      },
      {
        "model": "windows live onecare",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "*"
      },
      {
        "model": "forefront client security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "*"
      },
      {
        "model": "forefront security for exchange server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "*"
      },
      {
        "model": "antigen for smtp gateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "*"
      },
      {
        "model": "diagnostics and recovery toolset",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": "antigen",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "for exchange"
      },
      {
        "model": "antigen",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "for smtp gateway"
      },
      {
        "model": "forefront security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "for exchange server"
      },
      {
        "model": "forefront security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "for sharepoint"
      },
      {
        "model": "forefront security for exchange server",
        "scope": null,
        "trust": 0.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "antigen for exchange",
        "scope": null,
        "trust": 0.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "forefront security for sharepoint",
        "scope": null,
        "trust": 0.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "antigen for smtp gateway",
        "scope": null,
        "trust": 0.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows live onecare",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "0"
      },
      {
        "model": "windows defender edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "x640"
      },
      {
        "model": "windows defender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "0"
      },
      {
        "model": "standalone system sweeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "0"
      },
      {
        "model": "forefront security for sharepoint server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1.0"
      },
      {
        "model": "forefront security for exchange server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "1.0"
      },
      {
        "model": "forefront client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "0"
      },
      {
        "model": "antigen for smtp gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "9"
      },
      {
        "model": "antigen for exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "9"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "29060"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1437"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:microsoft:diagnostics_recovery_toolset",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:microsoft:antigen",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:microsoft:forefront_clinet_security",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:microsoft:forefront_security",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:microsoft:windows_defender",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:microsoft:windows_live_onecare",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sowhat  smaillist@gmail.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-1437",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2008-1437",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-31562",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2008-1437",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2008-1437",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200805-118",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-31562",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1437"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438. \nAttackers can exploit this issue to cause an affected computer to stop responding or to restart. Successful attacks will deny service to legitimate users. ----------------------------------------------------------------------\n\nSecunia Network Software Inspector 2.0 (NSI) - Public Beta\n\nThe Public Beta has ended. Thanks to all that participated. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits SoWhat, Nevis Labs. \n\nORIGINAL ADVISORY:\nMS08-029 (KB952044):\nhttp://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Microsoft Malware Protection Engine TWO DoS Vulnerabilities\n\n\nBy Sowhat of Nevis Labs\nDate: 2008.05.14\n\nhttp://www.nevisnetworks.com\nhttp://secway.org/advisory/AD20080514.txt\n\nCVE:    CVE-2008-1437\n        CVE-2008-1438\n\nVendor\nMicrosoft\n\nAffected:\nWindows Live OneCare\nMicrosoft Antigen for Exchange\nMicrosoft Antigen for SMTP Gateway\nMicrosoft Windows Defender\nMicrosoft Forefront Client Security\nMicrosoft Forefront Security for Exchange Server\nMicrosoft Forefront Security for SharePoint\nStandalone System Sweeper located in Diagnostics and Recovery Toolset 6.0\n\n\nDetails:\n\nThere are two vulnerabilities idenitified in Microsoft Antivirus product. \nThese vulnerabilities can be exploited to cause Denial of service. \n\n1. CVE-2008-1437 PE Parsing Memory Corruption\nWhile scanning a specially crafted PE file, Malware orotection engine\n(MsMpEng.exe/mpengine.dll for Windows Live OneCare) will crash. \n\nCurrently, There\u0027s no evidence of code execution found. \n\nPlease note that this vulnerability can be triggered in various ways:\na. by sending emails to target mail server which is protected by MS\nantivirus\nb. by sending emails to victim who is using Windows Onecare or Windows\nDefender. \nc. by convining the victim to visit some websites. \nd. by sending files (can be any extension) to victims through P2P/IM. \n\nReal Time protection is enabled by default, so in the case b\u0026c, the\nvulnerability\ncan be exploited without any further user interaction after the victim\nrecieved\nthe email or opened the website. \n\n\n2. CVE-2008-1438 PE Parsing Disk Space D.o.S\nWhile parsing a specially crafted file with a malformed \"size of header\"\nis scanned by Microsoft Windows OneCare, there will be Disk Space DOS\ncondition. \n\nMicrosoft Malware protection engine will allocate disk space as much as the\nPE file\n\"claimed\", It can \"eat\" several Gb disk space of Windows installation\ndriver. \n\n\n\nProof of Concept:\nNo POC will be released. \n\n\nFix:\nMicrosoft has released an update address this issue. \nhttp://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx\n\nVendor Response:\n\n2008.04.18 Vendor notified via email\n2008.04.18 Vendor response, developing for patch\n2008.05.14 Patch Release\n2008.05.14 Advisory released\n\n-- \nSowhat\nhttp://secway.org\n\"Life is like a bug, Do you know how to exploit it ?\"\n. The most severe\n   vulnerabilities  could  allow  a  remote,  unauthenticated attacker to\n   execute   arbitrary  code. \n\n\nII. Impact\n\n   A  remote, unauthenticated attacker could execute arbitrary code, gain\n   elevated privileges, or cause a denial of service. \n\n\nIII. Solution\n\nApply updates from Microsoft\n\n   Microsoft  has  provided  updates for these vulnerabilities in the May\n   2008  Security  Bulletin  Summary. The security bulletin describes any\n   known  issues related to the updates. Administrators are encouraged to\n   note  these  issues  and  test  for  any  potentially adverse effects. \n   Administrators  should consider using an automated update distribution\n   system such as Windows Server Update Services (WSUS). \n\n\nIV. References\n\n     * US-CERT  Vulnerability  Notes  for  Microsoft  May  2008 updates -\n       \u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=ms08-may\u003e\n     * Microsoft    Security    Bulletin   Summary   for   May   2008   -\n       \u003chttp://www.microsoft.com/technet/security/bulletin/ms08-may.mspx\u003e\n     * Microsoft Update -\n       \u003chttps://www.update.microsoft.com/microsoftupdate/\u003e\n     * Windows Server Update Services -\n       \u003chttp://www.microsoft.com/windowsserversystem/updateservices/default.mspx\u003e\n\n ____________________________________________________________________\n\n   The most recent version of this document can be found at:\n\n     \u003chttp://www.us-cert.gov/cas/techalerts/TA08-134A.html\u003e\n ____________________________________________________________________\n\n   Feedback can be directed to US-CERT Technical Staff. Please send\n   email to \u003ccert@cert.org\u003e with \"TA08-134A Feedback VU#534907\" in the\n   subject. \n ____________________________________________________________________\n\n   For instructions on subscribing to or unsubscribing from this\n   mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n   Produced 2008 by US-CERT, a government organization. \n\n   Terms of use:\n\n     \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n   \n   Revision History\n\n   May 13, 2008: Initial release\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBSCnrE/RFkHkM87XOAQJAoAf/XrkJlT9AS30/CZwAMO9qta8TbtLQTZR3\n/yAV/h2CmOKhFsbjdh8L4+GcP0n66twWhmMBfBs6BosOoaqqhkeJcE6JoyQ2Kso1\nMnhXjPJuGtgEPcfYX9bg42rnZ5WDXGh9EuhoZVyUV4UeUQ8qRM8LL3OIWBHubE7R\nfcOqIVDz/qtCC1U+RUdrbdeV8XB48mshiLoWjxzOT0FzeOKsBwsyHzaO5mAeEy4E\n1hsLC2u4idGlq9Ezl82XODyH6vtHBKq7yKDv+FkVHbCqwB+thqPkUo2es+amASra\nshcJggg39WWmPWphqnBz94rkdwitsvW3ymOWt1F27GecX1sveofLDQ==\n=rhf4\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-1437"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "db": "BID",
        "id": "29060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31562"
      },
      {
        "db": "PACKETSTORM",
        "id": "66305"
      },
      {
        "db": "PACKETSTORM",
        "id": "66402"
      },
      {
        "db": "PACKETSTORM",
        "id": "66311"
      }
    ],
    "trust": 2.25
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-31562",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31562"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-1437",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "29060",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "30172",
        "trust": 2.6
      },
      {
        "db": "USCERT",
        "id": "TA08-134A",
        "trust": 2.6
      },
      {
        "db": "SECTRACK",
        "id": "1020016",
        "trust": 2.5
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-1506",
        "trust": 1.7
      },
      {
        "db": "USCERT",
        "id": "SA08-134A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118",
        "trust": 0.7
      },
      {
        "db": "HP",
        "id": "HPSBST02336",
        "trust": 0.6
      },
      {
        "db": "MS",
        "id": "MS08-029",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "TA08-134A",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "66402",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-31562",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "66305",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "66311",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31562"
      },
      {
        "db": "BID",
        "id": "29060"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "db": "PACKETSTORM",
        "id": "66305"
      },
      {
        "db": "PACKETSTORM",
        "id": "66402"
      },
      {
        "db": "PACKETSTORM",
        "id": "66311"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1437"
      }
    ]
  },
  "id": "VAR-200805-0217",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31562"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T19:49:41.662000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MS08-029",
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx"
      },
      {
        "title": "MS08-029",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms08-029.mspx"
      },
      {
        "title": "MS08-029e",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/security/bulletins/MS08-029e.mspx"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-399",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1437"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/29060"
      },
      {
        "trust": 2.5,
        "url": "http://www.us-cert.gov/cas/techalerts/ta08-134a.html"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/30172"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1020016"
      },
      {
        "trust": 1.6,
        "url": "http://marc.info/?l=bugtraq\u0026m=121129490723574\u0026w=2"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2008/1506/references"
      },
      {
        "trust": 1.1,
        "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a13981"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2008/1506/references"
      },
      {
        "trust": 1.1,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms08-029.mspx"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1437"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2008/at080007.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta08-134a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trta08-134a/"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1437"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2008/may/1020016.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/cas/alerts/sa08-134a.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/2008/20080514_110201.html"
      },
      {
        "trust": 0.4,
        "url": "http://secway.org/advisory/ad20080514.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=121129490723574\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13488/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/network_software_inspector_2/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13487/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13422/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13486/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13464/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/30172/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/17290/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/18640/"
      },
      {
        "trust": 0.1,
        "url": "http://secway.org"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1437"
      },
      {
        "trust": 0.1,
        "url": "http://www.nevisnetworks.com"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1438"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta08-134a.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=ms08-may\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms08-may.mspx\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.microsoft.com/windowsserversystem/updateservices/default.mspx\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/signup.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/legal.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://www.update.microsoft.com/microsoftupdate/\u003e"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31562"
      },
      {
        "db": "BID",
        "id": "29060"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "db": "PACKETSTORM",
        "id": "66305"
      },
      {
        "db": "PACKETSTORM",
        "id": "66402"
      },
      {
        "db": "PACKETSTORM",
        "id": "66311"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1437"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-31562"
      },
      {
        "db": "BID",
        "id": "29060"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "db": "PACKETSTORM",
        "id": "66305"
      },
      {
        "db": "PACKETSTORM",
        "id": "66402"
      },
      {
        "db": "PACKETSTORM",
        "id": "66311"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1437"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-05-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31562"
      },
      {
        "date": "2008-05-13T00:00:00",
        "db": "BID",
        "id": "29060"
      },
      {
        "date": "2008-06-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "date": "2008-05-13T19:35:09",
        "db": "PACKETSTORM",
        "id": "66305"
      },
      {
        "date": "2008-05-15T07:54:53",
        "db": "PACKETSTORM",
        "id": "66402"
      },
      {
        "date": "2008-05-13T19:41:07",
        "db": "PACKETSTORM",
        "id": "66311"
      },
      {
        "date": "2008-05-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      },
      {
        "date": "2008-05-13T22:20:00",
        "db": "NVD",
        "id": "CVE-2008-1437"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31562"
      },
      {
        "date": "2008-05-14T17:05:00",
        "db": "BID",
        "id": "29060"
      },
      {
        "date": "2008-06-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      },
      {
        "date": "2024-11-21T00:44:31.733000",
        "db": "NVD",
        "id": "CVE-2008-1437"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "66311"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Microsoft Malware Protection Engine Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001359"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200805-118"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.