Vulnerabilities > CVE-2008-5284 - Numeric Errors vulnerability in IEA Software products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The web server in IEA Software RadiusNT and RadiusX 5.1.38 and other versions before 5.1.44, Emerald 5.0.49 and other versions before 5.0.52, Air Marshal 2.0.4 and other versions before 2.0.8, and Radius test client (aka Radlogin) 4.0.20 and earlier, allows remote attackers to cause a denial of service (crash) via an HTTP Content-Length header with a negative value, which triggers a single byte overwrite of memory using a NULL terminator. NOTE: some of these details are obtained from third party information.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
description | Multiple IEA Software Products HTTP POST Request Denial of Service Vulnerability. CVE-2008-5284. Dos exploits for multiple platform |
id | EDB-ID:31128 |
last seen | 2016-02-03 |
modified | 2008-02-08 |
published | 2008-02-08 |
reporter | Luigi Auriemma |
source | https://www.exploit-db.com/download/31128/ |
title | Multiple IEA Software Products HTTP POST Request Denial of Service Vulnerability |
References
- http://aluigi.altervista.org/adv/emerdal-adv.txt
- http://aluigi.altervista.org/adv/emerdal-adv.txt
- http://secunia.com/advisories/28846
- http://secunia.com/advisories/28846
- http://www.iea-software.com/docs/airmarshal1/changes.txt
- http://www.iea-software.com/docs/airmarshal1/changes.txt
- http://www.iea-software.com/docs/Emerald5/changes.txt
- http://www.iea-software.com/docs/Emerald5/changes.txt
- http://www.iea-software.com/docs/Radius40/changes.txt
- http://www.iea-software.com/docs/Radius40/changes.txt
- http://www.securityfocus.com/archive/1/487810/100/200/threaded
- http://www.securityfocus.com/archive/1/487810/100/200/threaded
- http://www.securityfocus.com/bid/27701
- http://www.securityfocus.com/bid/27701
- http://www.vupen.com/english/advisories/2008/0484
- http://www.vupen.com/english/advisories/2008/0484