CVE-2015-2094

Stack-based buffer overflow in the WESPPlayback.WESPPlaybackCtrl.1 control in WebGate WinRDS allows remote attackers to execute arbitrary code via unspecified vectors to the (1) PrintSiteImage, (2) PlaySiteAllChannel, (3) StopSiteAllChannel, or (4) SaveSiteImage function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webgateinc:winrds:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:26

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html - Exploit () http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html - Exploit
References () http://www.osvdb.org/118905 - () http://www.osvdb.org/118905 -
References () http://www.osvdb.org/118906 - () http://www.osvdb.org/118906 -
References () http://www.osvdb.org/118907 - () http://www.osvdb.org/118907 -
References () http://www.osvdb.org/118908 - () http://www.osvdb.org/118908 -
References () http://www.securityfocus.com/bid/72841 - () http://www.securityfocus.com/bid/72841 -
References () http://www.zerodayinitiative.com/advisories/ZDI-15-071/ - () http://www.zerodayinitiative.com/advisories/ZDI-15-071/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-15-072/ - () http://www.zerodayinitiative.com/advisories/ZDI-15-072/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-15-073/ - () http://www.zerodayinitiative.com/advisories/ZDI-15-073/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-15-074/ - () http://www.zerodayinitiative.com/advisories/ZDI-15-074/ -
References () https://www.exploit-db.com/exploits/36517/ - () https://www.exploit-db.com/exploits/36517/ -

Information

Published : 2015-03-09 14:59

Updated : 2024-11-21 02:26


NVD link : CVE-2015-2094

Mitre link : CVE-2015-2094

CVE.ORG link : CVE-2015-2094


JSON object : View

Products Affected

webgateinc

  • winrds
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer