CVE-2008-4250

N/A Unknown
Published: October 23, 2008 Modified: April 23, 2026
View on NVD

Description

The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://blogs.securiteam.com/index.php/archives/1150
Source: secure@microsoft.com
Permissions Required
http://marc.info/?l=bugtraq&m=122703006921213&w=2
Source: secure@microsoft.com
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/32326
Source: secure@microsoft.com
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/827267
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/497808/100/0/threaded
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/497816/100/0/threaded
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31874
Source: secure@microsoft.com
Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021091
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-297A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-088A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2902
Source: secure@microsoft.com
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46040
Source: secure@microsoft.com
Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/6824
Source: secure@microsoft.com
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/6841
Source: secure@microsoft.com
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/7104
Source: secure@microsoft.com
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/7132
Source: secure@microsoft.com
Exploit Third Party Advisory VDB Entry
http://blogs.securiteam.com/index.php/archives/1150
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://marc.info/?l=bugtraq&m=122703006921213&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/32326
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/827267
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/497808/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/497816/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31874
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021091
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-297A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-088A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2902
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46040
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6093
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/6824
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/6841
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/7104
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/7132
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry

36 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
93.5%
100th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft