VisiWaveReport.exe in AZO Technologies, Inc. VisiWave Site Survey before 2.1.9 allows user-assisted remote attackers to execute arbitrary code via a (1) vws and (2) vwr file with an invalid Type property, which triggers an untrusted pointer dereference.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/72464 - | |
References | () http://secunia.com/advisories/44636 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/17317 - Exploit | |
References | () http://www.securityfocus.com/bid/47948 - Exploit | |
References | () http://www.stratsec.net/Research/Advisories/VisiWave-Site-Survey-Report-Trusted-Pointer-%28SS-20 - Exploit | |
References | () http://www.visiwave.com/blog/index.php?/archives/4-Version-2.1.9-Released.html - Vendor Advisory |
Information
Published : 2011-06-08 10:36
Updated : 2024-11-21 01:28
NVD link : CVE-2011-2386
Mitre link : CVE-2011-2386
CVE.ORG link : CVE-2011-2386
JSON object : View
Products Affected
visiwave
- site_survey
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')