2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-1064" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-03-26T05:51:52.453" ,
2024-11-22 09:15:19 +00:00
"lastModified" : "2024-11-21T01:01:34.763" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Argument injection vulnerability in orbitmxt.dll 2.1.0.2 in the Orbit Downloader 2.8.7 and earlier ActiveX control allows remote attackers to overwrite arbitrary files via whitespace and a command-line switch, followed by a full pathname, in the third argument to the download method."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de inyecci\u00f3n de argumento en orbitmxt.dll v2.1.0.2 del ActiveX Orbit Downloader v2.8.7 y versiones previas, permite a atacantes remotos sobreescribir ficheros de su elecci\u00f3n a trav\u00e9s un espacio en blanco e interruptores de la l\u00ednea de comandos seguidos de un nombre de ruta completo en el tercer argumento del m\u00e9todo \"download\"."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:P" ,
2024-11-22 09:15:19 +00:00
"baseScore" : 5.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 09:15:19 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-94"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4D6523B1-6B03-43B6-AEFD-72B92019D992"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7553CFDF-7CA8-4DAF-8FFF-3D9222C25937"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.8.7" ,
"matchCriteriaId" : "A8309D23-4FB8-4D01-A152-14BF18C6D220"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9582704-5578-48A0-A410-0F66F0BB85A9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CEEC8A4-B3A3-447A-BFAD-0C663AF87E50"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CDEDDF18-2B7F-4C36-AF04-FD8980A2F88A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "04A8333D-8F29-4DB7-95F4-948A4810D3B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C3F23407-9615-4C6F-93C1-66BF0D2701B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DC08EF4B-F0C0-4481-A939-F54B47144FD6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B9B3EA76-C40F-4AE3-AA7E-C3001FDF2612"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6113A9CE-B5E9-4A0C-AD89-BD3B12BA4C04"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A9964A5-B840-43A0-9C47-7C4ED9DCB267"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B83AB34-50FE-4437-896D-4C33557FF4D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1C26D59-B436-4ED2-B13D-F81D3DE6D9C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "90842889-9B97-492B-8F4A-020A9302D8A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "95DD46C6-9D07-4A0E-801C-2EBFDB02E418"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A412B9B8-3011-4683-AD6B-1FC33E7C151C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F3471391-3784-420B-A5D2-4D1BE9AFC0E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BD7B7CF-628E-4D9D-AF21-70E56F532F7E"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.securityfocus.com/bid/34200" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.waraxe.us/advisory-73.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49353" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.exploit-db.com/exploits/8257" ,
"source" : "cve@mitre.org"
2024-11-22 09:15:19 +00:00
} ,
{
"url" : "http://www.securityfocus.com/bid/34200" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.waraxe.us/advisory-73.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49353" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.exploit-db.com/exploits/8257" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}