FKIE_CVE-2008-3249
Vulnerability from fkie_nvd - Published: 2008-07-21 17:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
The client in Lenovo System Update before 3.14 does not properly validate the certificate when establishing an SSL connection, which allows remote attackers to install arbitrary packages via an SSL certificate whose X.509 headers match a public certificate used by IBM.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| lenovo | thinkvantage_system_update | * | |
| lenovo | thinkvantage_system_update | 3.13 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lenovo:thinkvantage_system_update:*:*:*:*:*:*:*:*",
"matchCriteriaId": "310DD62B-8E91-410B-8C43-A831A6F75B99",
"versionEndIncluding": "3.13.0005",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lenovo:thinkvantage_system_update:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3804A80E-EDC6-48A9-A7D6-CA04708729DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The client in Lenovo System Update before 3.14 does not properly validate the certificate when establishing an SSL connection, which allows remote attackers to install arbitrary packages via an SSL certificate whose X.509 headers match a public certificate used by IBM."
},
{
"lang": "es",
"value": "Cliente de actualizaciones del sistema de Lenovo anerior a la v 3.14, no valida adecuadamente los certificados cuando establece una conexi\u00f3n SSL, lo que permite a atacantes remotos instalar paquetes de su elecci\u00f3n a trav\u00e9s de un certificado SSL cuya cabecera X.509 coincide con un certificado p\u00fablico usado por IBM."
}
],
"id": "CVE-2008-3249",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-07-21T17:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30379"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1020112"
},
{
"source": "cve@mitre.org",
"url": "http://www.security-objectives.com/advisories/SECOBJADV-2008-01.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/492579"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/29366"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42638"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30379"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1020112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.security-objectives.com/advisories/SECOBJADV-2008-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/492579"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/29366"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42638"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-255"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…