Vulnerability Description
Multiple stack-based buffer overflows in Sarg might allow attackers to execute arbitrary code via unknown vectors, probably a crafted Squid log file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sarg | Squid Analysis Report Generator | All versions |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.htmlExploit
- http://secunia.com/advisories/30156Vendor Advisory
- http://secunia.com/advisories/30202Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:073
- http://www.securityfocus.com/bid/29141
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42321
- http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.htmlExploit
- http://secunia.com/advisories/30156Vendor Advisory
- http://secunia.com/advisories/30202Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:073
- http://www.securityfocus.com/bid/29141
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42321
FAQ
What is CVE-2008-1922?
CVE-2008-1922 is a vulnerability with a CVSS score of 10.0 (HIGH). Multiple stack-based buffer overflows in Sarg might allow attackers to execute arbitrary code via unknown vectors, probably a crafted Squid log file.
How severe is CVE-2008-1922?
CVE-2008-1922 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1922?
Check the references section above for vendor advisories and patch information. Affected products include: Sarg Squid Analysis Report Generator.