CVE-2009-2875
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
18/12/2009
Last modified:
09/04/2025
Description
Buffer overflow in atas32.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 for Windows, 27.x before 27.10.x for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WebEx Recording Format (WRF) file.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:webex:26.00:*:linux:*:*:*:*:* | ||
| cpe:2.3:a:cisco:webex:26.00:*:mac_os_x:*:*:*:*:* | ||
| cpe:2.3:a:cisco:webex:26.00:*:windows:*:*:*:*:* | ||
| cpe:2.3:a:cisco:webex:27.00:*:linux:*:*:*:*:* | ||
| cpe:2.3:a:cisco:webex:27.00:*:mac_os_x:*:*:*:*:* | ||
| cpe:2.3:a:cisco:webex:27.00:*:windows:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/37810
- http://securitytracker.com/id?1023360=
- http://tools.cisco.com/security/center/viewAlert.x?alertId=19499
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml
- http://www.fortiguard.com/advisory/FGA-2009-48.html
- http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.dos.html
- http://www.osvdb.org/61125
- http://www.securityfocus.com/bid/37352
- http://www.vupen.com/english/advisories/2009/3574
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54841
- http://secunia.com/advisories/37810
- http://securitytracker.com/id?1023360=
- http://tools.cisco.com/security/center/viewAlert.x?alertId=19499
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml
- http://www.fortiguard.com/advisory/FGA-2009-48.html
- http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.dos.html
- http://www.osvdb.org/61125
- http://www.securityfocus.com/bid/37352
- http://www.vupen.com/english/advisories/2009/3574
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54841



