Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-1054

EPSS 19.52% · P95
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2008-1054

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Stack-based buffer overflow in the _lib_spawn_user_getpid function in (1) swatch.exe and (2) surgemail.exe in NetWin SurgeMail 38k4 and earlier, and beta 39a, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe and unspecified other CGI executables, which triggers an overflow when assigning values to environment variables. NOTE: some of these details are obtained from third party information.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
SurgeMail CGI可执行程序缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
NetWin SurgeMail是新西兰NetWin公司的一款下一代电子邮件服务器。该服务器支持IMAP、POP3、SMTP等协议,并提供邮件杀毒、垃圾邮件过滤、邮件备份等功能。 SurgeMail中用于处理CGI可执行程序的函数中存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞控制服务器。 当服务器接收到对CGI(如webmail.exe,但不是类似于user.cgi、admin.cgi的.cgi虚拟文件)的HTTP请求时,会使用大约20000字节存储所有传送给所调用程序的环境字符串。客户端在请求中所传送的
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2008-1054

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2008-1054

Please Login to view more intelligence information

Same Patch Batch · n/a · 2008-02-27 · 19 CVEs total

CVE-2008-1046quinsonnas_mail_checker ‘footer.php’ 远程文件包含漏洞
CVE-2008-1055SurgeMail webmail.exe 远程格式化字符串漏洞
CVE-2008-1053PHP-Nuke Kose_Yazilari模块多个SQL注入漏洞
CVE-2008-1052SurgeFTP Content-Length参数空指针引用拒绝服务漏洞
CVE-2008-1051phpProfiles 'include/body_comm.inc.php' 远程文件包含漏洞
CVE-2008-1050Softbiz Jokes和Funny Pictures Script ‘index.php’ SQL注入漏洞
CVE-2008-1049H-Sphere Parallels SiteStudio 未明漏洞
CVE-2008-1048Plume CMS 'manager/xmedia.php' 跨站脚本攻击漏洞
CVE-2008-1047TikiWiki 'tiki-edit_article.php' 跨站脚本攻击漏洞
CVE-2008-1037Packeteer PacketShaper/PolicyCenter 网页管理界面 跨站脚本攻击漏洞
CVE-2008-1045Alkacon OpenCms 'system/workplace/views/explorer/tree_files.jsp' 跨站脚本攻击漏洞
CVE-2008-1044Move Media Player Quantum Streaming IE播放器ActiveX控件 缓冲区溢出漏洞
CVE-2008-1043LWS php User Base 'templates/default/header.inc.php' 远程文件包含漏洞
CVE-2008-1042LWS php Download Manager 'include/body.inc.php' 目录遍历漏洞
CVE-2008-1041Matt's Whois 'mwhois.php' 跨站脚本攻击漏洞
CVE-2008-1040Fujitsu Interstage Application Server Single Sign-On函数 缓冲区溢出漏洞
CVE-2008-1039PORAR Webboard 'question.asp' SQL注入漏洞
CVE-2008-1038DrBenHur.com DBHcms 'mod.extmanager.php' 远程文件包含漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2008-1054

No comments yet


Leave a comment