CVE-2009-2876

CVSS V2 High 9.3 CVSS V3 None
Description
Heap-based buffer overflow in atas32.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 (aka T26SP49EP32) for Windows, 27.x before 27.10.x (aka T27SP10) for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted WebEx Recording Format (WRF) file, a different vulnerability than CVE-2009-2878 and CVE-2009-2879.
Overview
  • CVE ID
  • CVE-2009-2876
  • Assigner
  • ykramarz@cisco.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2009-12-18T19:30:00
  • Last Modified Date
  • 2017-08-17T01:30:56
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:cisco:webex:26.00:*:linux:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:26.00:*:mac_os_x:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:26.00:*:windows:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:linux:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:mac_os_x:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:windows:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://secunia.com/advisories/37810 Vendor Advisory
http://www.osvdb.org/61126
http://www.vupen.com/english/advisories/2009/3574 Vendor Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml Patch Vendor Advisory
http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html
http://www.securityfocus.com/bid/37352
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 Patch Vendor Advisory
http://securitytracker.com/id?1023360
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.fortiguard.com/advisory/FGA-2009-48.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/54841
History
Created Old Value New Value Data Type Notes
2022-05-10 09:00:26 Added to TrackCVE