Stack-based buffer overflow in the PestPatrol ActiveX control (ppctl.dll) 5.6.7.9 in CA eTrust PestPatrol allows remote attackers to execute arbitrary code via a long argument to the Initialize method.
References
Configurations
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.fortiguard.com/encyclopedia/vulnerability/ca.etrust.pestpatrol.ppctl.dll.activex.access.html - | |
References | () http://www.metasploit.com/redmine/projects/framework/repository/revisions/7167/entry/modules/exploits/windows/fileformat/etrust_pestscan.rb - Exploit | |
References | () http://www.securityfocus.com/bid/37133 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/54458 - |
Information
Published : 2009-12-08 18:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4225
Mitre link : CVE-2009-4225
CVE.ORG link : CVE-2009-4225
JSON object : View
Products Affected
ca
- etrust_pestpatrole_ppctl.dll_activex
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer