{"api_version":"1","generated_at":"2026-04-28T13:19:16+00:00","cve":"CVE-2008-1357","urls":{"html":"https://cve.report/CVE-2008-1357","api":"https://cve.report/api/cve/CVE-2008-1357.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-1357","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-1357"},"summary":{"title":"CVE-2008-1357","description":"Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build 1015, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in a sender field in an AgentWakeup request to UDP port 8082.  NOTE: this issue only exists when the debug level is 8.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-03-17 17:44:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-134","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5.4","severity":"","vector":"AV:N/AC:H/Au:N/C:N/I:N/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:N/A:C","baseScore":5.4,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://aluigi.altervista.org/adv/meccaffi-adv.txt","name":"http://aluigi.altervista.org/adv/meccaffi-adv.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41178","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41178","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/28228","name":"http://www.securityfocus.com/bid/28228","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"McAfee Framework ePolicy Orchestrator '_naimcomn_Log' Remote Format String Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://securityreason.com/securityalert/3748","name":"http://securityreason.com/securityalert/3748","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityReason - Format string in McAfee Framework 3.6.0.569 (ePolicy Orchestrator 4.0)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1019609","name":"http://www.securitytracker.com/id?1019609","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - McAfee ePolicy Orchestrator Format String Bug Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://knowledge.mcafee.com/article/234/615103_f.sal_public.html","name":"https://knowledge.mcafee.com/article/234/615103_f.sal_public.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/489476/100/0/threaded","name":"http://www.securityfocus.com/archive/1/489476/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29337","name":"http://secunia.com/advisories/29337","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"McAfee ePolicy Orchestrator Framework Service Format String Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/0866/references","name":"http://www.vupen.com/english/advisories/2008/0866/references","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-1357","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1357","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"agent","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"cma","cpe6":"3.0.6.453","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"cma","cpe6":"3.5.5.438","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"cma","cpe6":"3.6.438","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"cma","cpe6":"3.6.453","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"cma","cpe6":"3.6.546","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"cma","cpe6":"3.6.574","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"epolicy_orchestrator","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"mcafee_framework","cpe6":"3.6.569","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T08:17:34.576Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"3748","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/3748"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://knowledge.mcafee.com/article/234/615103_f.sal_public.html"},{"name":"mcafee-framework-format-string(41178)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41178"},{"name":"1019609","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1019609"},{"name":"29337","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29337"},{"name":"28228","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/28228"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://aluigi.altervista.org/adv/meccaffi-adv.txt"},{"name":"ADV-2008-0866","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/0866/references"},{"name":"20080312 Format string in McAfee Framework 3.6.0.569 (ePolicy Orchestrator 4.0)","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/489476/100/0/threaded"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-03-12T00:00:00.000Z","descriptions":[{"lang":"en","value":"Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build 1015, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in a sender field in an AgentWakeup request to UDP port 8082.  NOTE: this issue only exists when the debug level is 8."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-11T19:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"3748","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/3748"},{"tags":["x_refsource_CONFIRM"],"url":"https://knowledge.mcafee.com/article/234/615103_f.sal_public.html"},{"name":"mcafee-framework-format-string(41178)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41178"},{"name":"1019609","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1019609"},{"name":"29337","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29337"},{"name":"28228","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/28228"},{"tags":["x_refsource_MISC"],"url":"http://aluigi.altervista.org/adv/meccaffi-adv.txt"},{"name":"ADV-2008-0866","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/0866/references"},{"name":"20080312 Format string in McAfee Framework 3.6.0.569 (ePolicy Orchestrator 4.0)","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/489476/100/0/threaded"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-1357","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build 1015, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in a sender field in an AgentWakeup request to UDP port 8082.  NOTE: this issue only exists when the debug level is 8."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"3748","refsource":"SREASON","url":"http://securityreason.com/securityalert/3748"},{"name":"https://knowledge.mcafee.com/article/234/615103_f.sal_public.html","refsource":"CONFIRM","url":"https://knowledge.mcafee.com/article/234/615103_f.sal_public.html"},{"name":"mcafee-framework-format-string(41178)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41178"},{"name":"1019609","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1019609"},{"name":"29337","refsource":"SECUNIA","url":"http://secunia.com/advisories/29337"},{"name":"28228","refsource":"BID","url":"http://www.securityfocus.com/bid/28228"},{"name":"http://aluigi.altervista.org/adv/meccaffi-adv.txt","refsource":"MISC","url":"http://aluigi.altervista.org/adv/meccaffi-adv.txt"},{"name":"ADV-2008-0866","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/0866/references"},{"name":"20080312 Format string in McAfee Framework 3.6.0.569 (ePolicy Orchestrator 4.0)","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/489476/100/0/threaded"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-1357","datePublished":"2008-03-17T17:00:00.000Z","dateReserved":"2008-03-17T00:00:00.000Z","dateUpdated":"2024-08-07T08:17:34.576Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-03-17 17:44:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-134","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:N/A:C","baseScore":5.4,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:agent:4.0:*:*:*:*:*:*:*","matchCriteriaId":"43953695-9C35-4CC3-9591-D03866731F47"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:cma:3.0.6.453:*:*:*:*:*:*:*","matchCriteriaId":"9B7D230B-845A-4E83-B86C-000CDBAC937F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:cma:3.5.5.438:*:*:*:*:*:*:*","matchCriteriaId":"4A0590CC-B03B-472B-A5FF-F6A316DBE2DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:cma:3.6.438:*:*:*:*:*:*:*","matchCriteriaId":"0BD368FB-2683-4321-9491-CB757511AD49"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:cma:3.6.453:*:*:*:*:*:*:*","matchCriteriaId":"F64F9F3F-F835-4769-9A5B-A05ED2AE7850"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:cma:3.6.546:*:*:*:*:*:*:*","matchCriteriaId":"3C0AE0A0-E56A-4B93-B45B-037C09EA69C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:cma:3.6.574:*:*:*:*:*:*:*","matchCriteriaId":"CFF00F5B-4272-49CC-A9CE-4CCD20F5DB3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:epolicy_orchestrator:4.0:*:*:*:*:*:*:*","matchCriteriaId":"485DB16F-730A-44B2-A255-2583AB27DB9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:mcafee_framework:3.6.569:*:*:*:*:*:*:*","matchCriteriaId":"6330056D-1DAF-4821-90E5-1E9E52594A25"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"1357","Ordinal":"1","Title":"CVE-2008-1357","CVE":"CVE-2008-1357","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"1357","Ordinal":"1","NoteData":"Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build 1015, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in a sender field in an AgentWakeup request to UDP port 8082.  NOTE: this issue only exists when the debug level is 8.","Type":"Description","Title":"CVE-2008-1357"},{"CveYear":"2008","CveId":"1357","Ordinal":"2","NoteData":"2008-03-17","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"1357","Ordinal":"3","NoteData":"2018-10-11","Type":"Other","Title":"Modified"}]}}}