First published: Thu Sep 11 2008(Updated: )
Stack-based buffer overflow in SMGSHR.EXE in OpenVMS for Integrity Servers 8.2-1, 8.3, and 8.3-1H1 and OpenVMS ALPHA 7.3-2, 8.2, and 8.3 allows local users to cause a denial of service (crash) or gain privileges via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVMS | =8.3-1h1 | |
OpenVMS | =8.3 | |
OpenVMS | =8.2 | |
OpenVMS | =7.3-2 | |
OpenVMS | =8.2-1 | |
OpenVMS | =8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4052 has a high severity level as it allows local users to perform denial of service attacks or gain elevated privileges.
To fix CVE-2008-4052, upgrade to the latest supported version of OpenVMS that addresses this buffer overflow vulnerability.
CVE-2008-4052 affects OpenVMS versions 7.3-2, 8.2, 8.2-1, 8.3, and 8.3-1H1 on both Alpha and Integrity Servers.
CVE-2008-4052 is primarily a local vulnerability, meaning it can only be exploited by local authenticated users.
The potential impacts of CVE-2008-4052 include system crashes and unauthorized privilege escalation.