First published: Fri Dec 18 2009(Updated: )
Heap-based buffer overflow in atas32.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 (aka T26SP49EP32) for Windows, 27.x before 27.10.x (aka T27SP10) for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted WebEx Recording Format (WRF) file, a different vulnerability than CVE-2009-2878 and CVE-2009-2879.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Platform | =26.00 | |
Cisco Webex Platform | =27.00 | |
Cisco Webex Platform | =27.00 | |
Cisco Webex Platform | =26.00 | |
Cisco Webex Platform | =26.00 | |
Cisco Webex Platform | =27.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2876 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary code on affected systems.
To fix CVE-2009-2876, update the Cisco WebEx WRF Player to version 26.49.32 or later for 26.x versions, or to version 27.10.x or later for 27.x versions.
CVE-2009-2876 affects Cisco WebEx WRF Player versions 26.x prior to 26.49.32 and 27.x prior to 27.10.x on Windows, Linux, and Mac OS X.
CVE-2009-2876 can facilitate remote code execution attacks, allowing attackers to run arbitrary code on vulnerable systems.
There are no known workarounds for CVE-2009-2876, thus upgrading to a patched version is the advised mitigation.