First published: Tue Dec 08 2009(Updated: )
Stack-based buffer overflow in the PestPatrol ActiveX control (ppctl.dll) 5.6.7.9 in CA eTrust PestPatrol allows remote attackers to execute arbitrary code via a long argument to the Initialize method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom eTrust PestPatrol | =5.6.7.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4225 is categorized as a critical vulnerability due to a stack-based buffer overflow that can allow remote code execution.
To remediate CVE-2009-4225, it is recommended to update the CA eTrust PestPatrol software to a version that mitigates this vulnerability.
CVE-2009-4225 specifically affects CA eTrust PestPatrol version 5.6.7.9.
Yes, CVE-2009-4225 can be exploited remotely due to the nature of the buffer overflow in the ActiveX control.
The impact of CVE-2009-4225 includes the potential for attackers to execute arbitrary code on the affected system.