CVE-2009-2876

Heap-based buffer overflow in atas32.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 (aka T26SP49EP32) for Windows, 27.x before 27.10.x (aka T27SP10) for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted WebEx Recording Format (WRF) file, a different vulnerability than CVE-2009-2878 and CVE-2009-2879.
References
Link Resource
http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html
http://secunia.com/advisories/37810 Vendor Advisory
http://securitytracker.com/id?1023360
http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml Patch Vendor Advisory
http://www.fortiguard.com/advisory/FGA-2009-48.html
http://www.osvdb.org/61126
http://www.securityfocus.com/bid/37352
http://www.vupen.com/english/advisories/2009/3574 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54841
http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html
http://secunia.com/advisories/37810 Vendor Advisory
http://securitytracker.com/id?1023360
http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 Patch Vendor Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml Patch Vendor Advisory
http://www.fortiguard.com/advisory/FGA-2009-48.html
http://www.osvdb.org/61126
http://www.securityfocus.com/bid/37352
http://www.vupen.com/english/advisories/2009/3574 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54841
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:webex:26.00:*:linux:*:*:*:*:*
cpe:2.3:a:cisco:webex:26.00:*:mac_os_x:*:*:*:*:*
cpe:2.3:a:cisco:webex:26.00:*:windows:*:*:*:*:*
cpe:2.3:a:cisco:webex:27.00:*:linux:*:*:*:*:*
cpe:2.3:a:cisco:webex:27.00:*:mac_os_x:*:*:*:*:*
cpe:2.3:a:cisco:webex:27.00:*:windows:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html - () http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html -
References () http://secunia.com/advisories/37810 - Vendor Advisory () http://secunia.com/advisories/37810 - Vendor Advisory
References () http://securitytracker.com/id?1023360 - () http://securitytracker.com/id?1023360 -
References () http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - Patch, Vendor Advisory
References () http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml - Patch, Vendor Advisory () http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml - Patch, Vendor Advisory
References () http://www.fortiguard.com/advisory/FGA-2009-48.html - () http://www.fortiguard.com/advisory/FGA-2009-48.html -
References () http://www.osvdb.org/61126 - () http://www.osvdb.org/61126 -
References () http://www.securityfocus.com/bid/37352 - () http://www.securityfocus.com/bid/37352 -
References () http://www.vupen.com/english/advisories/2009/3574 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/3574 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54841 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54841 -

Information

Published : 2009-12-18 19:30

Updated : 2024-11-21 01:05


NVD link : CVE-2009-2876

Mitre link : CVE-2009-2876

CVE.ORG link : CVE-2009-2876


JSON object : View

Products Affected

cisco

  • webex
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer