CVE-2009-2878

CVSS V2 High 9.3 CVSS V3 None
Description
Heap-based buffer overflow in atas32.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 (aka T26SP49EP32) for Windows, 27.x before 27.10.x (aka T27SP10) for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted WebEx Recording Format (WRF) file, a different vulnerability than CVE-2009-2876 and CVE-2009-2879.
Overview
  • CVE ID
  • CVE-2009-2878
  • Assigner
  • ykramarz@cisco.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2009-12-18T19:30:00
  • Last Modified Date
  • 2017-08-17T01:30:56
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:cisco:webex:26.00:*:linux:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:26.00:*:mac_os_x:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:26.00:*:windows:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:linux:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:mac_os_x:*:*:*:*:* 1 OR
cpe:2.3:a:cisco:webex:27.00:*:windows:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://www.osvdb.org/61128
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml Patch Vendor Advisory
http://securitytracker.com/id?1023360 Patch
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 Vendor Advisory
http://secunia.com/advisories/37810 Vendor Advisory
http://www.fortiguard.com/advisory/FGA-2009-48.html
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.securityfocus.com/bid/37352
http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-013-cisco.html
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/3574 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54841
History
Created Old Value New Value Data Type Notes
2022-05-10 09:00:26 Added to TrackCVE