Microsoft Windows XP SP2 and SP3, and Server 2003 SP1 and SP2, does not properly validate the option length field in Pragmatic General Multicast (PGM) packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted PGM packet, aka the "PGM Invalid Length Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/30587 - Broken Link, Permissions Required, Vendor Advisory | |
References | () http://securitytracker.com/id?1020230 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/29508 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA08-162B.html - Broken Link, Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2008/1783 - Broken Link | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036 - Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5473 - Broken Link |
13 Feb 2024, 16:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft windows Server 2003
|
|
CPE | cpe:2.3:o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows:server_2003:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:* cpe:2.3:o:microsoft:windows:server_2003:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:server_2003:*:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows:server_2003:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* |
CWE | CWE-1284 | |
References | (SECTRACK) http://securitytracker.com/id?1020230 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA08-162B.html - Broken Link, Third Party Advisory, US Government Resource | |
References | (SECUNIA) http://secunia.com/advisories/30587 - Broken Link, Permissions Required, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/29508 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | (MS) https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036 - Patch, Vendor Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5473 - Broken Link |
Information
Published : 2008-06-12 02:32
Updated : 2024-11-21 00:44
NVD link : CVE-2008-1440
Mitre link : CVE-2008-1440
CVE.ORG link : CVE-2008-1440
JSON object : View
Products Affected
microsoft
- windows_server_2003
- windows_xp
CWE
CWE-1284
Improper Validation of Specified Quantity in Input