CVE-2008-4383
Summary
| CVE | CVE-2008-4383 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-10-03 22:22:00 UTC |
| Updated | 2018-11-02 13:07:00 UTC |
| Description | Stack-based buffer overflow in the Agranet-Emweb embedded management web server in Alcatel OmniSwitch OS7000, OS6600, OS6800, OS6850, and OS9000 Series devices with AoS 5.1 before 5.1.6.463.R02, 5.4 before 5.4.1.429.R01, 6.1.3 before 6.1.3.965.R01, 6.1.5 before 6.1.5.595.R01, and 6.3 before 6.3.1.966.R01 allows remote attackers to execute arbitrary code via a long Session cookie. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Alcatel | Aos | All | All | All | All |
| Operating System | Alcatel | Aos | All | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os6600 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os6800 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os6850 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os7000 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os9000 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os6600 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os6800 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os6850 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os7000 | All | All | All |
| Hardware | Alcatel-lucent | Omniswitch | os9000 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Third Party Advisory |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Alcatel-Lucent OmniSwitch Series Buffer Overflow Vulnerability - Secunia.com | SECUNIA | secunia.com | Third Party Advisory |
| Solutions | Nokia | CONFIRM | www1.alcatel-lucent.com | Vendor Advisory |
| Alcatel OmniSwitch Management Web Server Stack Overflow Lets Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Alcatel-Lucent OmniSwitch Products HTTP Header Remote Buffer Overflow Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | Third Party Advisory, VDB Entry |
| Layered Defense Security Advisories | MISC | www.layereddefense.com | Broken Link |
| SecurityReason - Alcatel-Lucent OmniSwitch products, Stack Buffer Overflow | SREASON | securityreason.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.