CVE-2008-1446

Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
References
Link Resource
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Issue Tracking Third Party Advisory
http://secunia.com/advisories/32248 Third Party Advisory
http://www.kb.cert.org/vuls/id/793233 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/31682 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021048 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-288A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2813 Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45545 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45548 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764 Third Party Advisory
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=122479227205998&w=2 Issue Tracking Third Party Advisory
http://secunia.com/advisories/32248 Third Party Advisory
http://www.kb.cert.org/vuls/id/793233 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/31682 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021048 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-288A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2813 Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45545 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45548 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_information_services:*:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*

History

No history.

Information

Published : 2008-10-15 00:12

Updated : 2025-04-09 00:30


NVD link : CVE-2008-1446

Mitre link : CVE-2008-1446

CVE.ORG link : CVE-2008-1446


JSON object : View

Products Affected

microsoft

  • windows_xp
  • windows_2000
  • windows_server_2003
  • internet_information_services
CWE
CWE-190

Integer Overflow or Wraparound