CVE-2009-2875

CVSS V2 High 9.3 CVSS V3 None
Description
Buffer overflow in atas32.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 for Windows, 27.x before 27.10.x for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WebEx Recording Format (WRF) file.
Overview
  • CVE ID
  • CVE-2009-2875
  • Assigner
  • ykramarz@cisco.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2009-12-18T19:30:00
  • Last Modified Date
  • 2017-08-17T01:30:56
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:cisco:webex:26.00:*:linux:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:26.00:*:mac_os_x:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:26.00:*:windows:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:linux:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:mac_os_x:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:windows:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/3574 Patch Vendor Advisory
http://securitytracker.com/id?1023360
http://www.osvdb.org/61125
http://www.securityfocus.com/bid/37352
http://secunia.com/advisories/37810 Vendor Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.fortiguard.com/advisory/FGA-2009-48.html
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.dos.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/54841
History
Created Old Value New Value Data Type Notes
2022-05-10 09:00:27 Added to TrackCVE