2024-07-14 02:06:08 +00:00

108 lines
3.2 KiB
JSON

{
"id": "CVE-2007-2238",
"sourceIdentifier": "cret@cert.org",
"published": "2009-04-16T15:12:57.280",
"lastModified": "2017-07-29T01:31:19.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the Whale Client Components ActiveX control (WhlMgr.dll), as used in Microsoft Intelligent Application Gateway (IAG) before 3.7 SP2, allow remote attackers to execute arbitrary code via long arguments to the (1) CheckForUpdates or (2) UpdateComponents methods."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en el control ActiveX Whale Client Components, como es usado en Microsoft Intelligent Application Gateway (IAG), antes de v3.7 SP2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante argumentos grandes a los m\u00e9todos (1) CheckForUpdates o (2) UpdateComponents."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:intelligent_application_gateway_2007:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "EADE9F62-25C2-42D3-AD6B-F42D5532C708"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:intelligent_application_gateway_2007:*:sp1:*:*:*:*:*:*",
"versionEndIncluding": "3.7",
"matchCriteriaId": "F6E439F6-4014-4019-A5B1-567B6D9C51B4"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/34725",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/789121",
"source": "cret@cert.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/34532",
"source": "cret@cert.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/1061",
"source": "cret@cert.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49888",
"source": "cret@cert.org"
}
]
}