CVE-2009-3576

Autodesk Softimage 7.x and Softimage XSI 6.x allow remote attackers to execute arbitrary JavaScript code via a scene package containing a Scene Table of Contents (aka .scntoc) file with a Script_Content element, as demonstrated by code that loads the WScript.Shell ActiveX control.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:autodesk:autodesk_softimage:7.0:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:autodesk_softimage_xsi:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:07

Type Values Removed Values Added
References () http://securitytracker.com/id?1023229 - () http://securitytracker.com/id?1023229 -
References () http://www.coresecurity.com/content/softimage-arbitrary-command-execution - Exploit () http://www.coresecurity.com/content/softimage-arbitrary-command-execution - Exploit
References () http://www.securityfocus.com/archive/1/508011/100/0/threaded - () http://www.securityfocus.com/archive/1/508011/100/0/threaded -
References () http://www.securityfocus.com/bid/36637 - () http://www.securityfocus.com/bid/36637 -

Information

Published : 2009-11-24 17:30

Updated : 2024-11-21 01:07


NVD link : CVE-2009-3576

Mitre link : CVE-2009-3576

CVE.ORG link : CVE-2009-3576


JSON object : View

Products Affected

autodesk

  • autodesk_softimage
  • autodesk_softimage_xsi
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')