CVE-2008-0892

The replication monitor CGI script (repl-monitor-cgi.pl) in Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, allows remote attackers to execute arbitrary commands.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:directory_server:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:directory_server:8:el4:*:*:*:*:*:*
cpe:2.3:o:redhat:directory_server:8:el5:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_directory_server:*:*:*:*:*:*:*:*

History

03 Feb 2022, 19:56

Type Values Removed Values Added
CPE cpe:2.3:o:red_hat:directory_server:8:el4:*:*:*:*:*:*
cpe:2.3:o:red_hat:directory_server:8:el5:*:*:*:*:*:*
cpe:2.3:o:redhat:directory_server:8:el5:*:*:*:*:*:*
cpe:2.3:o:redhat:directory_server:8:el4:*:*:*:*:*:*
References (SECTRACK) http://www.securitytracker.com/id?1019856 - (SECTRACK) http://www.securitytracker.com/id?1019856 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/29761 - (SECUNIA) http://secunia.com/advisories/29761 - Broken Link
References (SECUNIA) http://secunia.com/advisories/30114 - (SECUNIA) http://secunia.com/advisories/30114 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2008/1449/references - (VUPEN) http://www.vupen.com/english/advisories/2008/1449/references - Broken Link
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/29826 - (SECUNIA) http://secunia.com/advisories/29826 - Broken Link
References (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676 - (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676 - Broken Link
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=437301 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=437301 - Issue Tracking, Vendor Advisory
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/28802 - (BID) http://www.securityfocus.com/bid/28802 - Third Party Advisory, VDB Entry
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0199.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0199.html - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0201.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0201.html - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/41840 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/41840 - Third Party Advisory, VDB Entry

Information

Published : 2008-04-16 18:05

Updated : 2023-12-10 10:51


NVD link : CVE-2008-0892

Mitre link : CVE-2008-0892

CVE.ORG link : CVE-2008-0892


JSON object : View

Products Affected

redhat

  • directory_server
  • fedora_directory_server
CWE
CWE-20

Improper Input Validation