Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-1515

Опубликовано: 04 мая 2009
Источник: ubuntu
Приоритет: low
CVSS2: 6.8

Описание

Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information.

РелизСтатусПримечание
dapper

not-affected

introduced in 5.x
devel

not-affected

5.02-1ubuntu1
hardy

not-affected

introduced in 5.x
intrepid

not-affected

introduced in 5.x
jaunty

not-affected

introduced in 5.x
upstream

released

5.02-1

Показывать по

Ссылки на источники

6.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information.

nvd
почти 17 лет назад

Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information.

debian
почти 17 лет назад

Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c i ...

github
почти 4 года назад

Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information.

6.8 Medium

CVSS2