National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-0767 Detail

Description

ExtremeZ-IP.exe in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier does not verify that a certain "number of URLs" field is consistent with the packet length, which allows remote attackers to cause a denial of service (daemon crash) via a large integer in this field in a packet to the Service Location Protocol (SLP) service on UDP port 427, triggering an out-of-bounds read.

Source:  MITRE      Last Modified:  02/13/2008

Quick Info

CVE Dictionary Entry:
CVE-2008-0767
Original release date:
02/13/2008
Last revised:
03/07/2011
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
5.0 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Group Logic (02/21/2008)

Group Logic has fixed this issue in the ExtremeZ-IP 5.1.3x03 hotfix released on February 20, 2008. The update is free for all customers with active service contracts who own a version 5.x license and can be downloaded from http://www.grouplogic.com/files/ez/hot/hotFix51.cfm

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://aluigi.altervista.org/adv/ezipirla-adv.txt External Source MISC http://aluigi.altervista.org/adv/ezipirla-adv.txt
http://aluigi.org/poc/ezipirla.zip External Source MISC http://aluigi.org/poc/ezipirla.zip
http://www.grouplogic.com/files/ez/hot/hotFix51.cfm External Source CONFIRM http://www.grouplogic.com/files/ez/hot/hotFix51.cfm
http://www.securityfocus.com/archive/1/archive/1/487952/100/0/threaded External Source BUGTRAQ 20080211 Multiple vulnerabilities in EztremeZ-IP File and Printer Server 5.1.2x15
http://www.securityfocus.com/bid/27718 External Source BID 27718
http://www.vupen.com/english/advisories/2008/0485 External Source VUPEN ADV-2008-0485

Technical Details

Vulnerability Type (View All)

Change History 1 change record found - show changes