U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2008-3008

Change History

Modified Analysis by NIST 11/07/2016 5:25:04 PM

Action Type Old Value New Value
Changed CPE Configuration
Configuration 1
     AND
          OR
               *cpe:2.3:a:microsoft:windows_media_encoder:9_series:*:*:*:*:*:*:*
          OR
               *cpe:2.3:o:microsoft:windows-nt:2000:sp4:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:xp:sp2:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:xp:sp2:x64:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:2003:sp1:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:2003:sp2:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:2003:*:x64:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:2003:sp2:x64:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:vista:sp1:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:vista:*:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:vista:*:x64:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:vista:sp1:x64:*:*:*:*:*
               cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*
               cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*
Configuration 1
     AND
          OR
               *cpe:2.3:a:microsoft:windows_media_encoder:9_series:*:*:*:*:*:*:*
          OR
               *cpe:2.3:o:microsoft:windows-nt:2003:*:x64:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:2000:sp4:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:xp:sp2:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:xp:sp2:x64:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:2003:sp1:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:2003:sp2:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:2003:sp2:x64:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:vista:sp1:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:vista:*:*:*:*:*:*:*
               *cpe:2.3:o:microsoft:windows-nt:vista:sp1:x64:*:*:*:*:*
               cpe:2.3:o:microsoft:windows-nt:2008:*:x64:*:*:*:*:*
               cpe:2.3:o:microsoft:windows-nt:2008:*:*:*:*:*:*:*
Changed Reference Type
http://marc.info/?l=bugtraq&m=122235754013992&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=122235754013992&w=2 Mailing List
Changed Reference Type
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6018 No Types Assigned
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6018 Broken Link
Changed Reference Type
http://www.kb.cert.org/vuls/id/996227 US Government Resource
http://www.kb.cert.org/vuls/id/996227 Third Party Advisory, US Government Resource
Changed Reference Type
http://www.microsoft.com/technet/security/Bulletin/MS08-053.mspx Patch
http://www.microsoft.com/technet/security/Bulletin/MS08-053.mspx Mitigation, Vendor Advisory, Patch
Changed Reference Type
http://www.milw0rm.com/exploits/6454 No Types Assigned
http://www.milw0rm.com/exploits/6454 Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/31065 No Types Assigned
http://www.securityfocus.com/bid/31065 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1020832 No Types Assigned
http://www.securitytracker.com/id?1020832 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA08-253A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-253A.html Third Party Advisory, US Government Resource
Changed Reference Type
http://www.vupen.com/english/advisories/2008/2521 No Types Assigned
http://www.vupen.com/english/advisories/2008/2521 Broken Link