Multiple stack-based buffer overflows in the Research in Motion RIM AxLoader ActiveX control in AxLoader.ocx and AxLoader.dll in BlackBerry Application Web Loader 1.0 allow remote attackers to execute arbitrary code via unspecified use of the (1) load or (2) loadJad method.
References
Link | Resource |
---|---|
http://blackberry.com/btsc/KB16248 | Patch Vendor Advisory |
http://osvdb.org/51833 | |
http://secunia.com/advisories/33847 | Vendor Advisory |
http://www.kb.cert.org/vuls/id/131100 | US Government Resource |
http://www.microsoft.com/technet/security/advisory/960715.mspx | |
http://www.securityfocus.com/bid/33663 |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2009-02-10 22:30
Updated : 2024-02-04 17:33
NVD link : CVE-2009-0305
Mitre link : CVE-2009-0305
CVE.ORG link : CVE-2009-0305
JSON object : View
Products Affected
microsoft
- internet_explorer
research_in_motion_limited
- blackberry_application_web_loader
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer