Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-6015

Summary
Assigner-flexera
Assigner Org ID-44d08088-2bea-4760-83a6-1e9be26b15ab
Published At-13 Dec, 2007 | 21:00
Updated At-07 Aug, 2024 | 15:54
Rejected At-
Credits

Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:flexera
Assigner Org ID:44d08088-2bea-4760-83a6-1e9be26b15ab
Published At:13 Dec, 2007 | 21:00
Updated At:07 Aug, 2024 | 15:54
Rejected At:
▼CVE Numbering Authority (CNA)

Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.redhat.com/support/errata/RHSA-2007-1117.html
vendor-advisory
x_refsource_REDHAT
http://docs.info.apple.com/article.html?artnum=307430
x_refsource_CONFIRM
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/28891
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1
vendor-advisory
x_refsource_SUNALERT
http://secunia.com/advisories/30835
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/29341
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=120524782005154&w=2
vendor-advisory
x_refsource_HP
http://www.kb.cert.org/vuls/id/438395
third-party-advisory
x_refsource_CERT-VN
http://www.securityfocus.com/bid/26791
vdb-entry
x_refsource_BID
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1
vendor-advisory
x_refsource_SUNALERT
http://www.novell.com/linux/security/advisories/2007_68_samba.html
vendor-advisory
x_refsource_SUSE
http://www.ubuntu.com/usn/usn-556-1
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2008/1908
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/0495/references
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=120524782005154&w=2
vendor-advisory
x_refsource_HP
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/27999
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/485144/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/30484
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/29032
third-party-advisory
x_refsource_SECUNIA
http://www.samba.org/samba/security/CVE-2007-6015.html
x_refsource_CONFIRM
http://secunia.com/advisories/27993
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/38965
vdb-entry
x_refsource_XF
http://www.debian.org/security/2007/dsa-1427
vendor-advisory
x_refsource_DEBIAN
http://www.securityfocus.com/archive/1/488457/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.mandriva.com/security/advisories?name=MDKSA-2007:244
vendor-advisory
x_refsource_MANDRIVA
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
vendor-advisory
x_refsource_HP
http://bugs.gentoo.org/show_bug.cgi?id=200773
x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/484818/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.securitytracker.com/id?1019065
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/27977
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0637
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/28029
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/4153
vdb-entry
x_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
x_refsource_CONFIRM
http://secunia.com/advisories/28089
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28003
third-party-advisory
x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1976
x_refsource_CONFIRM
http://www.us-cert.gov/cas/techalerts/TA08-043B.html
third-party-advisory
x_refsource_CERT
http://www.redhat.com/support/errata/RHSA-2007-1114.html
vendor-advisory
x_refsource_REDHAT
http://securityreason.com/securityalert/3438
third-party-advisory
x_refsource_SREASON
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554
vendor-advisory
x_refsource_SLACKWARE
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html
vendor-advisory
x_refsource_FEDORA
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/27894
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/27760
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1712/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/secunia_research/2007-99/advisory/
x_refsource_MISC
http://secunia.com/advisories/28067
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28037
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0859/references
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/archive/1/484825/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/484827/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/28028
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605
vdb-entry
signature
x_refsource_OVAL
http://security.gentoo.org/glsa/glsa-200712-10.xml
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1117.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://docs.info.apple.com/article.html?artnum=307430
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000005.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/28891
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://secunia.com/advisories/30835
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/29341
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=120524782005154&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.kb.cert.org/vuls/id/438395
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://www.securityfocus.com/bid/26791
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.novell.com/linux/security/advisories/2007_68_samba.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.ubuntu.com/usn/usn-556-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2008/1908
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/0495/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=120524782005154&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/27999
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/485144/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/30484
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/29032
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.samba.org/samba/security/CVE-2007-6015.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/27993
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/38965
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.debian.org/security/2007/dsa-1427
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.securityfocus.com/archive/1/488457/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:244
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=200773
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/archive/1/484818/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.securitytracker.com/id?1019065
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/27977
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/0637
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/28029
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/4153
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/28089
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28003
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://issues.rpath.com/browse/RPL-1976
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-043B.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1114.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://securityreason.com/securityalert/3438
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/27894
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/27760
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/1712/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/secunia_research/2007-99/advisory/
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/28067
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28037
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/0859/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/484825/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.securityfocus.com/archive/1/484827/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/28028
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://security.gentoo.org/glsa/glsa-200712-10.xml
Resource:
vendor-advisory
x_refsource_GENTOO
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.redhat.com/support/errata/RHSA-2007-1117.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://docs.info.apple.com/article.html?artnum=307430
x_refsource_CONFIRM
x_transferred
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/28891
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://secunia.com/advisories/30835
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/29341
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=120524782005154&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.kb.cert.org/vuls/id/438395
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://www.securityfocus.com/bid/26791
vdb-entry
x_refsource_BID
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.novell.com/linux/security/advisories/2007_68_samba.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.ubuntu.com/usn/usn-556-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2008/1908
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/0495/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=120524782005154&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/27999
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/485144/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/30484
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/29032
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.samba.org/samba/security/CVE-2007-6015.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/27993
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/38965
vdb-entry
x_refsource_XF
x_transferred
http://www.debian.org/security/2007/dsa-1427
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.securityfocus.com/archive/1/488457/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2007:244
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
vendor-advisory
x_refsource_HP
x_transferred
http://bugs.gentoo.org/show_bug.cgi?id=200773
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/archive/1/484818/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.securitytracker.com/id?1019065
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/27977
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/0637
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/28029
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/4153
vdb-entry
x_refsource_VUPEN
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/28089
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28003
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://issues.rpath.com/browse/RPL-1976
x_refsource_CONFIRM
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-043B.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-1114.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://securityreason.com/securityalert/3438
third-party-advisory
x_refsource_SREASON
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554
vendor-advisory
x_refsource_SLACKWARE
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/27894
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/27760
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/1712/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/secunia_research/2007-99/advisory/
x_refsource_MISC
x_transferred
http://secunia.com/advisories/28067
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28037
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/0859/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/archive/1/484825/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.securityfocus.com/archive/1/484827/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/28028
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://security.gentoo.org/glsa/glsa-200712-10.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1117.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=307430
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000005.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/28891
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://secunia.com/advisories/30835
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/29341
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=120524782005154&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/438395
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/26791
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2007_68_samba.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-556-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1908
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0495/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=120524782005154&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/27999
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/485144/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/30484
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/29032
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.samba.org/samba/security/CVE-2007-6015.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/27993
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/38965
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.debian.org/security/2007/dsa-1427
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/488457/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:244
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=200773
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/484818/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.securitytracker.com/id?1019065
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/27977
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0637
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/28029
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/4153
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/28089
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28003
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-1976
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-043B.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1114.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://securityreason.com/securityalert/3438
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/27894
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/27760
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1712/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/secunia_research/2007-99/advisory/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/28067
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28037
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0859/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/484825/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/484827/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/28028
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200712-10.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:PSIRT-CNA@flexerasoftware.com
Published At:13 Dec, 2007 | 21:46
Updated At:30 Oct, 2018 | 16:25

Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Samba
samba
>>samba>>2.0.1
cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.2
cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.3
cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.4
cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.5
cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.6
cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.7
cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.8
cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.9
cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.0.10
cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.0
cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.0a
cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.1a
cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.2
cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.3
cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.3a
cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.4
cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.5
cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.6
cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.7
cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.7a
cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.8
cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.8a
cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.9
cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.11
cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*
Samba
samba
>>samba>>2.2.12
cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.0
cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.1
cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.2
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.2a
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.10
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.11
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.12
cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.13
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.14
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.14a
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.20
cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.20a
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.20b
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.21
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.21a
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.21b
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.21c
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.22
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23a
cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23b
cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23c
cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.23d
cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.24
cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.0.25
cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.gentoo.org/show_bug.cgi?id=200773PSIRT-CNA@flexerasoftware.com
N/A
http://docs.info.apple.com/article.html?artnum=307430PSIRT-CNA@flexerasoftware.com
N/A
http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.htmlPSIRT-CNA@flexerasoftware.com
N/A
http://lists.vmware.com/pipermail/security-announce/2008/000005.htmlPSIRT-CNA@flexerasoftware.com
N/A
http://marc.info/?l=bugtraq&m=120524782005154&w=2PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/27760PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/27894PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/27977PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/27993PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/27999PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/28003PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/28028PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/28029PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/28037PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/28067PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/28089PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/28891PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/29032PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/29341PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/30484PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/advisories/30835PSIRT-CNA@flexerasoftware.com
N/A
http://secunia.com/secunia_research/2007-99/advisory/PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200712-10.xmlPSIRT-CNA@flexerasoftware.com
N/A
http://securityreason.com/securityalert/3438PSIRT-CNA@flexerasoftware.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554PSIRT-CNA@flexerasoftware.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1PSIRT-CNA@flexerasoftware.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1PSIRT-CNA@flexerasoftware.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2007-520.htmPSIRT-CNA@flexerasoftware.com
N/A
http://www.debian.org/security/2007/dsa-1427PSIRT-CNA@flexerasoftware.com
N/A
http://www.kb.cert.org/vuls/id/438395PSIRT-CNA@flexerasoftware.com
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:244PSIRT-CNA@flexerasoftware.com
N/A
http://www.novell.com/linux/security/advisories/2007_68_samba.htmlPSIRT-CNA@flexerasoftware.com
N/A
http://www.redhat.com/support/errata/RHSA-2007-1114.htmlPSIRT-CNA@flexerasoftware.com
Patch
http://www.redhat.com/support/errata/RHSA-2007-1117.htmlPSIRT-CNA@flexerasoftware.com
N/A
http://www.samba.org/samba/security/CVE-2007-6015.htmlPSIRT-CNA@flexerasoftware.com
Patch
http://www.securityfocus.com/archive/1/484818/100/0/threadedPSIRT-CNA@flexerasoftware.com
N/A
http://www.securityfocus.com/archive/1/484825/100/0/threadedPSIRT-CNA@flexerasoftware.com
N/A
http://www.securityfocus.com/archive/1/484827/100/0/threadedPSIRT-CNA@flexerasoftware.com
N/A
http://www.securityfocus.com/archive/1/485144/100/0/threadedPSIRT-CNA@flexerasoftware.com
N/A
http://www.securityfocus.com/archive/1/488457/100/0/threadedPSIRT-CNA@flexerasoftware.com
N/A
http://www.securityfocus.com/bid/26791PSIRT-CNA@flexerasoftware.com
N/A
http://www.securitytracker.com/id?1019065PSIRT-CNA@flexerasoftware.com
N/A
http://www.ubuntu.com/usn/usn-556-1PSIRT-CNA@flexerasoftware.com
N/A
http://www.us-cert.gov/cas/techalerts/TA08-043B.htmlPSIRT-CNA@flexerasoftware.com
US Government Resource
http://www.vupen.com/english/advisories/2007/4153PSIRT-CNA@flexerasoftware.com
N/A
http://www.vupen.com/english/advisories/2008/0495/referencesPSIRT-CNA@flexerasoftware.com
N/A
http://www.vupen.com/english/advisories/2008/0637PSIRT-CNA@flexerasoftware.com
N/A
http://www.vupen.com/english/advisories/2008/0859/referencesPSIRT-CNA@flexerasoftware.com
N/A
http://www.vupen.com/english/advisories/2008/1712/referencesPSIRT-CNA@flexerasoftware.com
N/A
http://www.vupen.com/english/advisories/2008/1908PSIRT-CNA@flexerasoftware.com
N/A
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657PSIRT-CNA@flexerasoftware.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/38965PSIRT-CNA@flexerasoftware.com
N/A
https://issues.rpath.com/browse/RPL-1976PSIRT-CNA@flexerasoftware.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572PSIRT-CNA@flexerasoftware.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605PSIRT-CNA@flexerasoftware.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.htmlPSIRT-CNA@flexerasoftware.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.htmlPSIRT-CNA@flexerasoftware.com
N/A
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=200773
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=307430
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000005.html
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=120524782005154&w=2
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27760
Source: PSIRT-CNA@flexerasoftware.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/27894
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27977
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27993
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27999
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28003
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28028
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28029
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28037
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28067
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28089
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28891
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/29032
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/29341
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30484
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30835
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://secunia.com/secunia_research/2007-99/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Resource:
Vendor Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200712-10.xml
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/3438
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2007/dsa-1427
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/438395
Source: PSIRT-CNA@flexerasoftware.com
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:244
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2007_68_samba.html
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1114.html
Source: PSIRT-CNA@flexerasoftware.com
Resource:
Patch
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-1117.html
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.samba.org/samba/security/CVE-2007-6015.html
Source: PSIRT-CNA@flexerasoftware.com
Resource:
Patch
Hyperlink: http://www.securityfocus.com/archive/1/484818/100/0/threaded
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/484825/100/0/threaded
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/484827/100/0/threaded
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/485144/100/0/threaded
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/488457/100/0/threaded
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/26791
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1019065
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-556-1
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-043B.html
Source: PSIRT-CNA@flexerasoftware.com
Resource:
US Government Resource
Hyperlink: http://www.vupen.com/english/advisories/2007/4153
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/0495/references
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/0637
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/0859/references
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1712/references
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1908
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/38965
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-1976
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html
Source: PSIRT-CNA@flexerasoftware.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2691Records found

CVE-2009-3812
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-21.22% / 95.46%
||
7 Day CHG~0.00%
Published-27 Oct, 2009 | 16:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in OtsAV DJ trial version 1.85.64.0, Radio trial version 1.85.64.0, TV trial version 1.85.64.0, and Free version 1.77.001 allows remote attackers to execute arbitrary code via a long playlist in an Ots File List (.ofl) file.

Action-Not Available
Vendor-otslabsn/a
Product-otsav_tvotsav_djotsav_radion/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3569
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-4.93% / 89.22%
||
7 Day CHG~0.00%
Published-06 Oct, 2009 | 20:19
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in OpenOffice.org (OOo) allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side stack overflow exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-openoffice.orgn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3838
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-23.36% / 95.74%
||
7 Day CHG~0.00%
Published-02 Nov, 2009 | 15:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Pegasus Mail (PMail) 4.41 and possibly 4.51 allows remote POP3 servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long error message.

Action-Not Available
Vendor-pmailn/a
Product-pegasus_mailn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3537
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-2.04% / 83.12%
||
7 Day CHG~0.00%
Published-02 Oct, 2009 | 19:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflows in EpicDJSoftware EpicDJ 1.3.9.1 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long string in a (1) .m3u or (2) .mpl playlist file.

Action-Not Available
Vendor-epicdjsoftwaren/a
Product-epicdjn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3867
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-89.28% / 99.52%
||
7 Day CHG+1.05%
Published-05 Nov, 2009 | 16:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)Microsoft Corporation
Product-solarisjrejava_sewindowsjdksdkn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3969
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-4.92% / 89.21%
||
7 Day CHG~0.00%
Published-18 Nov, 2009 | 23:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Faslo Player 7.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long string in a .m3u playlist file.

Action-Not Available
Vendor-faslon/a
Product-faslo_playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3130
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-63.95% / 98.35%
||
7 Day CHG~0.00%
Published-11 Nov, 2009 | 20:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a spreadsheet containing a malformed Binary File Format (aka BIFF) record that triggers memory corruption, aka "Excel Document Parsing Heap Overflow Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-open_xml_file_format_convertercompatibility_pack_word_excel_powerpointofficeexcel_viewerexceln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3214
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-64.78% / 98.40%
||
7 Day CHG~0.00%
Published-16 Sep, 2009 | 17:00
Updated-07 Aug, 2024 | 06:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflows in Photodex ProShow Gold 4.0.2549 allow remote attackers to execute arbitrary code via a crafted Slideshow project (.psh) file, related to the (1) cell[n].images[m].image and (2) cell[n].sound.file fields.

Action-Not Available
Vendor-photodexn/a
Product-proshow_goldn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3878
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.43% / 61.40%
||
7 Day CHG~0.00%
Published-05 Nov, 2009 | 16:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Sun Java System Web Server 7.0 Update 6 has unspecified impact and remote attack vectors, as demonstrated by the vd_sjws module in VulnDisco Pack Professional 8.12. NOTE: as of 20091105, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Action-Not Available
Vendor-intevydisn/aSun Microsystems (Oracle Corporation)
Product-java_system_web_servervulndisco_packn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3794
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-9.3||HIGH
EPSS-19.78% / 95.22%
||
7 Day CHG+11.55%
Published-10 Dec, 2009 | 19:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via crafted dimensions of JPEG data in an SWF file.

Action-Not Available
Vendor-n/aAdobe Inc.
Product-adobe_airflash_playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3837
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-65.81% / 98.44%
||
7 Day CHG~0.00%
Published-02 Nov, 2009 | 15:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.

Action-Not Available
Vendor-eureka-emailn/a
Product-eureka_emailn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3476
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-1.56% / 80.77%
||
7 Day CHG~0.00%
Published-29 Sep, 2009 | 23:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in OpenSAML before 1.1.3 as used in Internet2 Shibboleth Service Provider software 1.3.x before 1.3.4, and XMLTooling before 1.2.2 as used in Internet2 Shibboleth Service Provider software 2.x before 2.2.1, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed encoded URL.

Action-Not Available
Vendor-internet2n/a
Product-xmltoolingshibboleth-spopensamln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3571
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-0.48% / 64.30%
||
7 Day CHG~0.00%
Published-06 Oct, 2009 | 20:19
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Action-Not Available
Vendor-openofficen/a
Product-openoffice.orgn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3329
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-5.85% / 90.21%
||
7 Day CHG~0.00%
Published-23 Sep, 2009 | 10:00
Updated-07 Aug, 2024 | 06:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Winplot 1.25.0.1 allows user-assisted remote attackers to execute arbitrary code via a crafted Plot2D (.wp2) file.

Action-Not Available
Vendor-exetern/a
Product-winplotn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3868
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-14.55% / 94.20%
||
7 Day CHG~0.00%
Published-05 Nov, 2009 | 16:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)Microsoft Corporation
Product-solarisjrejava_sewindowsjdksdkn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3924
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-2.69% / 85.28%
||
7 Day CHG~0.00%
Published-10 Nov, 2009 | 02:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in pbsv.dll, as used in Soldier of Fortune II and possibly other applications when Even Balance PunkBuster 1.728 or earlier is enabled, allows remote attackers to cause a denial of service (application server crash) and possibly execute arbitrary code via a long restart packet.

Action-Not Available
Vendor-punkbusterraven_softwaren/a
Product-punkbustersoldier_of_fortune_2n/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3429
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-71.95% / 98.68%
||
7 Day CHG~0.00%
Published-25 Sep, 2009 | 22:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Pirate Radio Destiny Media Player 1.61 allows remote attackers to execute arbitrary code via a long string in a .pls playlist file.

Action-Not Available
Vendor-pirateradion/a
Product-destiny_media_playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3996
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-9.3||HIGH
EPSS-9.88% / 92.71%
||
7 Day CHG~0.00%
Published-18 Dec, 2009 | 19:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.

Action-Not Available
Vendor-nullsoftraphael_assenatn/a
Product-winamplibmikmodn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3254
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-5.09% / 89.40%
||
7 Day CHG~0.00%
Published-18 Sep, 2009 | 20:00
Updated-07 Aug, 2024 | 06:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflows in Ultimate Player 1.56 beta allow remote attackers to execute arbitrary code via a long string in a (1) .m3u or (2) .upl playlist file.

Action-Not Available
Vendor-ultimatevideositen/a
Product-ultimate_playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3708
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-9.13% / 92.36%
||
7 Day CHG~0.00%
Published-16 Oct, 2009 | 16:00
Updated-17 Sep, 2024 | 02:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the Meta Content Optimizer in Konae Technologies Alleycode HTML Editor 2.21 allows user-assisted remote attackers to execute arbitrary code via a long value in a (1) description or (2) keyword META tag. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Action-Not Available
Vendor-konaen/a
Product-alleycode_html_editorn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3790
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-3.73% / 87.54%
||
7 Day CHG~0.00%
Published-26 Oct, 2009 | 17:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in FormMax (formerly AcroForm) evaluation 3.5 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted FormMax import (.aim) file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Action-Not Available
Vendor-cutepdfn/a
Product-formmaxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-2994
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-51.12% / 97.79%
||
7 Day CHG~0.00%
Published-19 Oct, 2009 | 22:00
Updated-07 Aug, 2024 | 06:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.

Action-Not Available
Vendor-n/aAdobe Inc.
Product-acrobat_readeracrobatn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3031
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-76.85% / 98.91%
||
7 Day CHG~0.00%
Published-03 Nov, 2009 | 16:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-altiris_notification_serveraltiris_deployment_solutionaltiris_management_platformn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3058
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-7.69% / 91.56%
||
7 Day CHG~0.00%
Published-03 Sep, 2009 | 17:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in akPlayer 1.9.0 allows remote attackers to execute arbitrary code via a long string in a .plt playlist file.

Action-Not Available
Vendor-aksoftn/a
Product-akplayern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3135
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-69.33% / 98.58%
||
7 Day CHG~0.00%
Published-11 Nov, 2009 | 19:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Microsoft Office Word 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, Open XML File Format Converter for Mac, Office Word Viewer 2003 SP3, and Office Word Viewer allow remote attackers to execute arbitrary code via a Word document with a malformed File Information Block (FIB) structure, aka "Microsoft Office Word File Information Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-office_word_vieweroffice_wordopen_xml_file_format_converterofficen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-2211
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-7.8||HIGH
EPSS-20.02% / 95.27%
||
7 Day CHG~0.00%
Published-30 Jun, 2016 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted CAB file that is mishandled during decompression.

Action-Not Available
Vendor-n/aApple Inc.Symantec CorporationLinux Kernel Organization, Inc
Product-mail_security_for_dominocsapiprotection_for_sharepoint_serverslinux_kernelnorton_security_with_backupmacosmessage_gatewaynorton_bootable_removal_tooldata_center_security_servernorton_internet_securityngcnorton_power_eraserprotection_engineendpoint_protectionnorton_antivirusmail_security_for_microsoft_exchangeadvanced_threat_protectionnorton_360message_gateway_for_service_providersnorton_securityn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3810
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-7.58% / 91.47%
||
7 Day CHG~0.00%
Published-27 Oct, 2009 | 16:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in Acoustica MP3 Audio Mixer 2.471 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long string in a .M3U playlist file.

Action-Not Available
Vendor-acoustican/a
Product-mp3_audio_mixern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3459
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-9.3||HIGH
EPSS-89.52% / 99.53%
||
7 Day CHG~0.00%
Published-13 Oct, 2009 | 10:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aAdobe Inc.
Product-readeracrobat_readeracrobatn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3574
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-2.32% / 84.18%
||
7 Day CHG~0.00%
Published-06 Oct, 2009 | 20:19
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tuniac 090517c allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long File1 argument in a .pls playlist file, possibly a buffer overflow.

Action-Not Available
Vendor-tony_millionn/a
Product-tuniacn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-3318
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-31.60% / 96.64%
||
7 Day CHG~0.00%
Published-09 Aug, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted file, aka "Graphics Component Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-officen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-3367
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-24.25% / 95.87%
||
7 Day CHG~0.00%
Published-14 Sep, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

StringBuilder in Microsoft Silverlight 5 before 5.1.50709.0 does not properly allocate memory for string-insert and string-append operations, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Microsoft Silverlight Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-silverlightn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3244
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-46.11% / 97.56%
||
7 Day CHG~0.00%
Published-18 Sep, 2009 | 10:00
Updated-07 Aug, 2024 | 06:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value.

Action-Not Available
Vendor-n/aAdobe Inc.
Product-shockwave_playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-2362
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-24.34% / 95.88%
||
7 Day CHG~0.00%
Published-08 Jul, 2009 | 15:00
Updated-07 Aug, 2024 | 05:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in KUDRSOFT AudioPLUS 2.0.0.215 allows remote attackers to execute arbitrary code via a long string in a (1) .lst or (2) .m3u playlist file.

Action-Not Available
Vendor-yukudrn/a
Product-audioplusn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3995
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-9.3||HIGH
EPSS-9.81% / 92.67%
||
7 Day CHG~0.00%
Published-18 Dec, 2009 | 18:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple heap-based buffer overflows in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-nullsoftraphael_assenatn/a
Product-winamplibmikmodn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3176
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-5.40% / 89.75%
||
7 Day CHG~0.00%
Published-11 Sep, 2009 | 20:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the ActiveX control in Novell iPrint Client 4.38 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.1, "Novell iPrint Client 4.38 ActiveX exploit." NOTE: as of 20090909, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.

Action-Not Available
Vendor-n/aNovell
Product-iprintn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3717
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-4.57% / 88.79%
||
7 Day CHG~0.00%
Published-16 Oct, 2009 | 16:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in LucVil PatPlayer 3.9 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URI in a playlist (.m3u) file.

Action-Not Available
Vendor-lucviln/a
Product-patplayern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3869
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-78.48% / 98.99%
||
7 Day CHG~0.00%
Published-05 Nov, 2009 | 16:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)Microsoft Corporation
Product-solarisjrejava_sewindowsjdksdkn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3428
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-9.62% / 92.58%
||
7 Day CHG~0.00%
Published-25 Sep, 2009 | 22:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Easy Music Player 1.0.0.2 allows remote attackers to execute arbitrary code via a crafted .wav file.

Action-Not Available
Vendor-otbcoden/a
Product-easy_music_playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3364
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-6.22% / 90.51%
||
7 Day CHG~0.00%
Published-24 Sep, 2009 | 16:00
Updated-07 Aug, 2024 | 06:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in FTPShell Client 4.1 RC2 allows remote FTP servers to execute arbitrary code via a long response to a PASV command.

Action-Not Available
Vendor-ftpshelln/a
Product-ftpshelln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3037
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-16.84% / 94.69%
||
7 Day CHG~0.00%
Published-01 Sep, 2009 | 16:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in xlssr.dll in the Autonomy KeyView XLS viewer (aka File Viewer for Excel), as used in IBM Lotus Notes 5.x through 8.5.x, Symantec Mail Security, Symantec BrightMail Appliance, Symantec Data Loss Prevention (DLP), and other products, allows remote attackers to execute arbitrary code via a crafted .xls spreadsheet attachment.

Action-Not Available
Vendor-autonomyn/aSymantec CorporationIBM Corporation
Product-keyviewdata_loss_prevention_endpoint_agentsdata_loss_prevention_detection_serversmail_security_appliancebrightmail_appliancelotus_notesmail_securityn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-3463
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-9.3||HIGH
EPSS-7.28% / 91.29%
||
7 Day CHG~0.00%
Published-04 Nov, 2009 | 15:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aAdobe Inc.
Product-shockwave_playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-2363
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-7.65% / 91.54%
||
7 Day CHG~0.00%
Published-08 Jul, 2009 | 15:00
Updated-07 Aug, 2024 | 05:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in KUDRSOFT AudioPLUS 2.00.215 allows remote attackers to execute arbitrary code via a .pls playlist file with a playlist entry containing a long File1 argument.

Action-Not Available
Vendor-yukudrn/a
Product-audioplusn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-2986
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-37.03% / 97.04%
||
7 Day CHG~0.00%
Published-19 Oct, 2009 | 22:00
Updated-07 Aug, 2024 | 06:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple heap-based buffer overflows in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.

Action-Not Available
Vendor-n/aAdobe Inc.
Product-acrobat_readeracrobatn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-3282
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-41.94% / 97.34%
||
7 Day CHG~0.00%
Published-13 Jul, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, SharePoint Server 2016, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-office_web_apps_serverword_for_macoffice_web_appsoffice_online_serverword_vieweroffice_compatibility_packsharepoint_serverword_rtofficewordn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-2617
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-6.69% / 90.87%
||
7 Day CHG~0.00%
Published-27 Jul, 2009 | 18:00
Updated-16 Sep, 2024 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in medialib.dll in BaoFeng Storm 3.9.62 allows remote attackers to execute arbitrary code via a long pathname in the source attribute of an item element in a .smpl playlist file.

Action-Not Available
Vendor-baofengn/a
Product-stormn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-3934
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.58%
||
7 Day CHG~0.00%
Published-10 Oct, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

drivers/media/platform/msm/camera_v2/sensor/io/msm_camera_cci_i2c.c in the Qualcomm camera driver in Android before 2016-10-05 on Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, and Android One devices relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka Android internal bug 30102557 and Qualcomm internal bug CR 789704.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-3365
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-21.70% / 95.52%
||
7 Day CHG~0.00%
Published-14 Sep, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3362.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-office_online_serveroffice_compatibility_packexcelexcel_viewersharepoint_designern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-2799
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-8.8||HIGH
EPSS-1.16% / 77.72%
||
7 Day CHG~0.00%
Published-13 Mar, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.

Action-Not Available
Vendor-siln/aMozilla CorporationopenSUSESUSEOracle Corporation
Product-leapopensusefirefoxgraphite2linuxlinux_enterprisen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-2496
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-61.26% / 98.26%
||
7 Day CHG~0.00%
Published-12 Aug, 2009 | 17:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 allows remote attackers to execute arbitrary code via unspecified parameters to unknown methods, aka "Office Web Components Heap Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-officeoffice_web_componentsvisual_studio_.netinternet_security_and_acceleration_serverbiztalk_servern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-2485
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-80.02% / 99.07%
||
7 Day CHG~0.00%
Published-16 Jul, 2009 | 16:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in HT-MP3Player 1.0 allows remote attackers to execute arbitrary code via a long string in a .ht3 file.

Action-Not Available
Vendor-tingann/a
Product-ht-mp3playern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 53
  • 54
  • Next
Details not found