← Volver a CVEs
CVE-2008-5121
N/ADescripcion
dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\.\DNE device interface.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado11/18/2008
Ultima modificacion4/9/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
bluecoat:winproxycisco:vpn_clientcitrix:deterministic_network_enhancersafenet:highassurance_remotesafenet:softremote_vpn_client
Debilidades (CWE)
CWE-264
Referencias
http://secunia.com/advisories/30728(cve@mitre.org)
http://secunia.com/advisories/30744(cve@mitre.org)
http://secunia.com/advisories/30747(cve@mitre.org)
http://secunia.com/advisories/30753(cve@mitre.org)
http://securityreason.com/securityalert/4600(cve@mitre.org)
http://support.citrix.com/article/CTX117751(cve@mitre.org)
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860(cve@mitre.org)
http://www.digit-labs.org/files/exploits/dne2000-call.c(cve@mitre.org)
http://www.kb.cert.org/vuls/id/858993(cve@mitre.org)
http://www.securityfocus.com/bid/29772(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/1865(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/1866(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/1867(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/1868(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43153(cve@mitre.org)
https://www.exploit-db.com/exploits/5837(cve@mitre.org)
http://secunia.com/advisories/30728(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30744(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30747(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30753(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/4600(af854a3a-2127-422b-91ae-364da2661108)
http://support.citrix.com/article/CTX117751(af854a3a-2127-422b-91ae-364da2661108)
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860(af854a3a-2127-422b-91ae-364da2661108)
http://www.digit-labs.org/files/exploits/dne2000-call.c(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/858993(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/29772(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/1865(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/1866(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/1867(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/1868(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43153(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/5837(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.