The SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance does not properly restrict access to the HTTPDownloadFile, HTTPGetFile, Install, and RunCmd methods, which allows remote attackers to execute arbitrary programs via a URL in the url argument to (1) HTTPDownloadFile or (2) HTTPGetFile.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/39751 - Vendor Advisory | |
References | () http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html - | |
References | () http://www.kb.cert.org/vuls/id/602801 - Patch, US Government Resource | |
References | () http://www.securityfocus.com/archive/1/511176/100/0/threaded - | |
References | () http://www.wintercore.com/downloads/rootedcon_0day.pdf - Exploit |
Information
Published : 2010-05-12 11:46
Updated : 2024-11-21 01:15
NVD link : CVE-2010-1908
Mitre link : CVE-2010-1908
CVE.ORG link : CVE-2010-1908
JSON object : View
Products Affected
consona
- consona_dynamic_agent
- consona_subscriber_assistance
- consona_live_assistance
CWE
CWE-264
Permissions, Privileges, and Access Controls