René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

89 lines
3.6 KiB
JSON

{
"id": "CVE-2011-2591",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2011-08-05T21:55:01.903",
"lastModified": "2011-09-07T03:17:37.677",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the Provideo ActiveX controls allow remote attackers to execute arbitrary code via crafted input fields, as demonstrated by (1) a long strIp argument to the voice method in 2way.dll in the alarm 1.0.3.1 ActiveX control, (2) a network response to AXPlayer.ocx in the GMAXPlayer 2.0.8.2 ActiveX control, the (3) UserName or (4) Password parameter to AXPlayer.ocx in the GMAXPlayer 2.0.8.2 ActiveX control, (5) a long Id parameter to the GetString method in PAxPlayer.ocx in the PAxPlayer 3.0.0.9 ActiveX control, or (6) a long strAdr parameter to the ConnectIPCam method in PAxPlayer.ocx in the PAxPlayer 3.0.0.9 ActiveX control."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de buffer en los controles ActiveX Provideo permiten a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de campos de entrada modificados, como se ha demostrado por (1) un argumento strIp extenso al m\u00e9todo voice de 2way.dll el control ActiveX alarm 1.0.3.1, (2) una respuesta de red a AXPlayer.ocx del control ActiveX GMAXPlayer 2.0.8.2, el (3) par\u00e1metro UserName o (4) Password a AXPlayer.ocx en el control ActiveX GMAXPlayer 2.0.8.2, (5) un par\u00e1metro Id extenso al m\u00e9todo GetString de PAxPlayer.ocx en control ActiveX PAxPlayer 3.0.0.9 o (6) un par\u00e1metro strAdr extenso al m\u00e9todo ConnectIPCam de PAxPlayer.ocx en el control ActiveX PAxPlayer 3.0.0.9."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:provideo:alarm_activex_control:3.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CF67117D-909D-40B6-BA30-AD774593EFAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:provideo:gmax_activex_control:2.0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE5EF11-8093-4BC5-A021-16CFF56DFE5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:provideo:paxplayer_activex_control:3.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E45C6B5F-A2BC-4404-8821-CF3BC9080701"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/48977",
"source": "PSIRT-CNA@flexerasoftware.com"
}
]
}