Vulnerability Description
Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel 4.9.23 and 4.9.24, and possibly earlier, allows remote attackers to execute arbitrary code via an RDP file containing a long string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oxid | Cain And Abel | 4.9.23 |
Related Weaknesses (CWE)
References
- http://osvdb.org/50342
- http://oxid.netsons.org/phpBB2/viewtopic.php?t=2750
- http://secunia.com/advisories/32794Vendor Advisory
- http://securityreason.com/securityalert/4703
- http://www.securityfocus.com/bid/32543
- http://www.vupen.com/english/advisories/2008/3286
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46940
- https://www.exploit-db.com/exploits/7297
- https://www.exploit-db.com/exploits/7309
- http://osvdb.org/50342
- http://oxid.netsons.org/phpBB2/viewtopic.php?t=2750
- http://secunia.com/advisories/32794Vendor Advisory
- http://securityreason.com/securityalert/4703
- http://www.securityfocus.com/bid/32543
- http://www.vupen.com/english/advisories/2008/3286
FAQ
What is CVE-2008-5405?
CVE-2008-5405 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel 4.9.23 and 4.9.24, and possibly earlier, allows remote attackers to execute arbitrary code via an RDP file containing a ...
How severe is CVE-2008-5405?
CVE-2008-5405 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5405?
Check the references section above for vendor advisories and patch information. Affected products include: Oxid Cain And Abel.