Vulnerabilities > CVE-2008-1319 - Unspecified vulnerability in Versant Object Database 7.0.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Untrusted search path and argument injection vulnerability in the VersantD service in Versant Object Database 7.0.1.3 and earlier, as used in Borland CaliberRM and probably other products, allows remote attackers to execute arbitrary commands via a request to TCP port 5019 with a modified VERSANT_ROOT field.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Versant Object Database. CVE-2008-1319. Remote exploit for windows platform |
file | exploits/windows/remote/5213.txt |
id | EDB-ID:5213 |
last seen | 2016-01-31 |
modified | 2008-03-04 |
platform | windows |
port | |
published | 2008-03-04 |
reporter | Luigi Auriemma |
source | https://www.exploit-db.com/download/5213/ |
title | Versant Object Database <= 7.0.1.3 - Commands Execution Exploit |
type | remote |
Nessus
NASL family | Gain a shell remotely |
NASL id | VERSANT_CMD_EXEC.NASL |
description | The version of the Versant Object Database installed on the remote host accepts input supplied by the client and uses it to launch needed programs or locate database files. An unauthenticated, remote attacker can leverage this issue to execute arbitrary commands on the affected host subject to the privileges under which the service operates, which under Windows is SYSTEM. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 31419 |
published | 2008-03-12 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/31419 |
title | Versant Connection Services Daemon Arbitrary Command Execution |
code |
|
References
- http://aluigi.altervista.org/adv/versantcmd-adv.txt
- http://aluigi.altervista.org/adv/versantcmd-adv.txt
- http://marc.info/?l=bugtraq&m=120468784112145&w=2
- http://marc.info/?l=bugtraq&m=120468784112145&w=2
- http://secunia.com/advisories/29230
- http://secunia.com/advisories/29230
- http://securityreason.com/securityalert/3738
- http://securityreason.com/securityalert/3738
- http://www.securityfocus.com/archive/1/489139/100/0/threaded
- http://www.securityfocus.com/archive/1/489139/100/0/threaded
- http://www.securityfocus.com/bid/28097
- http://www.securityfocus.com/bid/28097
- http://www.vupen.com/english/advisories/2008/0764/references
- http://www.vupen.com/english/advisories/2008/0764/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40997
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40997
- https://www.exploit-db.com/exploits/5213
- https://www.exploit-db.com/exploits/5213