Home / CVE DB / CVE-2008-3068
Standard
Vulnerability Identifier

CVE-2008-3068

2008-07-07
Severity Assessment
LOW
CVSS v3.x Score
Clinical Analysis (Description)

Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension.

Vector Sequencing

Attack Parameters

Impact Consequences

Technical Impact

CVSS v2 Score (Legacy)
7.5

For backward compatibility

EPSS Probability
12.63%

Percentile: 94.0%

Weakness Classification

CWE-NVD-CWE-Other

Affected Population

Affected Configurations

Total: 22 detected entries

Software List Scrollable
mi
excel
Vendor: microsoft • v2007
mi
access
Vendor: microsoft • v2007
mi
windows_live_mail
Vendor: microsoft • v2008
mi
excel
Vendor: microsoft • v2003
mi
infopath
Vendor: microsoft • v2007
mi
office
Vendor: microsoft • v2007
mi
powerpoint
Vendor: microsoft • v2003
mi
outlook
Vendor: microsoft • v2007
mi
sharepoint_designer
Vendor: microsoft • v2007
mi
visio_standard
Vendor: microsoft • v2007
mi
publisher
Vendor: microsoft • v2003
mi
powerpoint
Vendor: microsoft • v2007
mi
onenote
Vendor: microsoft • v2003
mi
visio_professional
Vendor: microsoft • v2007
mi
project_standard
Vendor: microsoft • v2007
mi
frontpage
Vendor: microsoft • v2003
mi
groove
Vendor: microsoft • v2007
mi
office_communicator
Vendor: microsoft • v2007
mi
project_professional
Vendor: microsoft • v2007
mi
infopath
Vendor: microsoft • v2003
mi
publisher
Vendor: microsoft • v2007
mi
outlook
Vendor: microsoft • v2003
Timeline

Time Line

PUBLICATION
07 Jul 2008
MODIFICATION
23 Apr 2026
Impact Statistics

Key Metrics

CVSS Score
LOW
Products
22
Affected
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.