ID

VAR-200802-0084


CVE

CVE-2008-0945


TITLE

Ipswitch IM of IM Server of logging Format string vulnerability in functions

Trust: 0.8

sources: JVNDB: JVNDB-2008-004153

DESCRIPTION

Format string vulnerability in the logging function in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in an IP address field. Ipswitch Instant Messaging is prone to multiple security vulnerabilities, including a denial-of-service vulnerability, a format-string vulnerability, and a vulnerability that allows attackers to overwrite arbitrary files. Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or overwrite files with arbitrary content. These issues affect Ipswitch Instant Messaging 2.0.8.1; other versions may also be affected. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Ipswitch Instant Messaging IMServer Denial of Service SECUNIA ADVISORY ID: SA28824 VERIFY ADVISORY: http://secunia.com/advisories/28824/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote SOFTWARE: Ipswitch Instant Messaging 2.x http://secunia.com/product/14854/ Ipswitch Collaboration Suite (ICS) 2.x http://secunia.com/product/5167/ DESCRIPTION: Luigi Auriemma has discovered a vulnerability in Ipswitch Instant Messaging, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the IMServer service (IMServer.exe) and can be exploited to crash the service via a specially crafted packet sent to default port 5177/TCP. NOTE: Other errors have also been reported e.g. a format-string error in the logging function. The vulnerability is confirmed in version 2.08 and is also reported to affect the IM clients. SOLUTION: Use in a trusted network environment only. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/ipsimene-adv.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-0945 // JVNDB: JVNDB-2008-004153 // BID: 27677 // VULHUB: VHN-31070 // PACKETSTORM: 63425

AFFECTED PRODUCTS

vendor:ipswitchmodel:imserverscope:lteversion:2.0.8.1

Trust: 1.8

vendor:ipswitchmodel:instant messagingscope:lteversion:2.0.8.1

Trust: 1.8

vendor:ipswitchmodel:instant messagingscope:eqversion:2.0.8.1

Trust: 0.9

vendor:ipswitchmodel:imserverscope:eqversion:2.0.8.1

Trust: 0.6

sources: BID: 27677 // JVNDB: JVNDB-2008-004153 // CNNVD: CNNVD-200802-453 // NVD: CVE-2008-0945

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0945
value: LOW

Trust: 1.0

NVD: CVE-2008-0945
value: LOW

Trust: 0.8

CNNVD: CNNVD-200802-453
value: LOW

Trust: 0.6

VULHUB: VHN-31070
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2008-0945
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31070
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31070 // JVNDB: JVNDB-2008-004153 // CNNVD: CNNVD-200802-453 // NVD: CVE-2008-0945

PROBLEMTYPE DATA

problemtype:CWE-134

Trust: 1.8

sources: JVNDB: JVNDB-2008-004153 // NVD: CVE-2008-0945

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200802-453

TYPE

format string

Trust: 0.6

sources: CNNVD: CNNVD-200802-453

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-004153

PATCH

title:Instant Messagingurl:http://www.imailserver.com/products/ipswitch-instant-messaging/

Trust: 0.8

sources: JVNDB: JVNDB-2008-004153

EXTERNAL IDS

db:NVDid:CVE-2008-0945

Trust: 2.8

db:BIDid:27677

Trust: 2.0

db:SECUNIAid:28824

Trust: 1.8

db:SREASONid:3697

Trust: 1.7

db:JVNDBid:JVNDB-2008-004153

Trust: 0.8

db:BUGTRAQid:20080207 MULTIPLE VULNERABILITIES IN IPSWITCH INSTANT MESSAGING 2.0.8.1

Trust: 0.6

db:CNNVDid:CNNVD-200802-453

Trust: 0.6

db:VULHUBid:VHN-31070

Trust: 0.1

db:PACKETSTORMid:63425

Trust: 0.1

sources: VULHUB: VHN-31070 // BID: 27677 // JVNDB: JVNDB-2008-004153 // PACKETSTORM: 63425 // CNNVD: CNNVD-200802-453 // NVD: CVE-2008-0945

REFERENCES

url:http://aluigi.altervista.org/adv/ipsimene-adv.txt

Trust: 1.8

url:http://www.securityfocus.com/bid/27677

Trust: 1.7

url:http://aluigi.org/poc/ipsimene.zip

Trust: 1.7

url:http://secunia.com/advisories/28824

Trust: 1.7

url:http://securityreason.com/securityalert/3697

Trust: 1.7

url:http://www.securityfocus.com/archive/1/487748/100/200/threaded

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0945

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0945

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/487748/100/200/threaded

Trust: 0.6

url:http://www.ipswitch.com/products/instant_messaging

Trust: 0.3

url:/archive/1/487748

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/28824/

Trust: 0.1

url:http://secunia.com/product/14854/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/5167/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-31070 // BID: 27677 // JVNDB: JVNDB-2008-004153 // PACKETSTORM: 63425 // CNNVD: CNNVD-200802-453 // NVD: CVE-2008-0945

CREDITS

Luigi Auriemma is credited with discovering these vulnerabilities.

Trust: 0.3

sources: BID: 27677

SOURCES

db:VULHUBid:VHN-31070
db:BIDid:27677
db:JVNDBid:JVNDB-2008-004153
db:PACKETSTORMid:63425
db:CNNVDid:CNNVD-200802-453
db:NVDid:CVE-2008-0945

LAST UPDATE DATE

2025-04-10T22:57:19.908000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31070date:2018-10-15T00:00:00
db:BIDid:27677date:2016-07-06T14:17:00
db:JVNDBid:JVNDB-2008-004153date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200802-453date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0945date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-31070date:2008-02-25T00:00:00
db:BIDid:27677date:2008-02-07T00:00:00
db:JVNDBid:JVNDB-2008-004153date:2012-09-25T00:00:00
db:PACKETSTORMid:63425date:2008-02-09T00:15:54
db:CNNVDid:CNNVD-200802-453date:2008-02-25T00:00:00
db:NVDid:CVE-2008-0945date:2008-02-25T21:44:00