CVE-2010-1913

The default configuration of pluginlicense.ini for the SdcWebSecureBase interface in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance, when downloaded from a server operated by Telefonica or possibly other companies, contains an incorrect DNS whitelist that includes the DNS hostnames of home computers of many persons, which allows remote attackers to bypass intended restrictions on ActiveX execution by hosting an ActiveX control on an applicable home web server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:consona:consona_dynamic_agent:-:-:enterprise:*:*:*:*:*
cpe:2.3:a:consona:consona_dynamic_agent:-:-:marketing:*:*:*:*:*
cpe:2.3:a:consona:consona_dynamic_agent:-:-:support:*:*:*:*:*
cpe:2.3:a:consona:consona_live_assistance:*:*:*:*:*:*:*:*
cpe:2.3:a:consona:consona_subscriber_assistance:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html - () http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html -
References () http://www.kb.cert.org/vuls/id/602801 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/602801 - Patch, US Government Resource
References () http://www.securityfocus.com/archive/1/511176/100/0/threaded - () http://www.securityfocus.com/archive/1/511176/100/0/threaded -
References () http://www.wintercore.com/downloads/rootedcon_0day.pdf - Exploit () http://www.wintercore.com/downloads/rootedcon_0day.pdf - Exploit

Information

Published : 2010-05-12 11:46

Updated : 2024-11-21 01:15


NVD link : CVE-2010-1913

Mitre link : CVE-2010-1913

CVE.ORG link : CVE-2010-1913


JSON object : View

Products Affected

consona

  • consona_dynamic_agent
  • consona_subscriber_assistance
  • consona_live_assistance
CWE
CWE-16

Configuration