CVE-2009-2875

Buffer overflow in atas32.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 for Windows, 27.x before 27.10.x for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WebEx Recording Format (WRF) file.
References
Link Resource
http://secunia.com/advisories/37810 Vendor Advisory
http://securitytracker.com/id?1023360
http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml Patch Vendor Advisory
http://www.fortiguard.com/advisory/FGA-2009-48.html
http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.dos.html
http://www.osvdb.org/61125
http://www.securityfocus.com/bid/37352
http://www.vupen.com/english/advisories/2009/3574 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54841
http://secunia.com/advisories/37810 Vendor Advisory
http://securitytracker.com/id?1023360
http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml Patch Vendor Advisory
http://www.fortiguard.com/advisory/FGA-2009-48.html
http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.dos.html
http://www.osvdb.org/61125
http://www.securityfocus.com/bid/37352
http://www.vupen.com/english/advisories/2009/3574 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54841
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:webex:26.00:*:linux:*:*:*:*:*
cpe:2.3:a:cisco:webex:26.00:*:mac_os_x:*:*:*:*:*
cpe:2.3:a:cisco:webex:26.00:*:windows:*:*:*:*:*
cpe:2.3:a:cisco:webex:27.00:*:linux:*:*:*:*:*
cpe:2.3:a:cisco:webex:27.00:*:mac_os_x:*:*:*:*:*
cpe:2.3:a:cisco:webex:27.00:*:windows:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://secunia.com/advisories/37810 - Vendor Advisory () http://secunia.com/advisories/37810 - Vendor Advisory
References () http://securitytracker.com/id?1023360 - () http://securitytracker.com/id?1023360 -
References () http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml - Patch, Vendor Advisory () http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml - Patch, Vendor Advisory
References () http://www.fortiguard.com/advisory/FGA-2009-48.html - () http://www.fortiguard.com/advisory/FGA-2009-48.html -
References () http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.dos.html - () http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.dos.html -
References () http://www.osvdb.org/61125 - () http://www.osvdb.org/61125 -
References () http://www.securityfocus.com/bid/37352 - () http://www.securityfocus.com/bid/37352 -
References () http://www.vupen.com/english/advisories/2009/3574 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/3574 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54841 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54841 -

Information

Published : 2009-12-18 19:30

Updated : 2024-11-21 01:05


NVD link : CVE-2009-2875

Mitre link : CVE-2009-2875

CVE.ORG link : CVE-2009-2875


JSON object : View

Products Affected

cisco

  • webex
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer