First published: Wed Feb 02 2011(Updated: )
Multiple stack-based buffer overflows in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players T27LB before SP21 EP3 and T27LC before SP22 allow remote attackers to execute arbitrary code via a crafted (1) .wrf or (2) .arf file, related to use of a function pointer in a callback mechanism.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Advanced Recording Format Player | =26.49 | |
Cisco WebEx Advanced Recording Format Player | =27.10 | |
Cisco WebEx Advanced Recording Format Player | =27.11.0.3328 | |
Cisco WebEx Advanced Recording Format Player | =27.12 | |
Cisco WebEx Advanced Recording Format Player | =27.13 | |
Cisco WebEx WRF Player | =26.49 | |
Cisco WebEx WRF Player | =27.10 | |
Cisco WebEx WRF Player | =27.11.0.3328 | |
Cisco WebEx WRF Player | =27.12 | |
Cisco WebEx WRF Player | =27.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3269 has been classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2010-3269, users should upgrade to the latest version of the Cisco WebEx Recording Format Player that is not affected by this vulnerability.
CVE-2010-3269 can lead to arbitrary code execution when a user opens a malformed .wrf or .arf file in the vulnerable player.
CVE-2010-3269 affects various versions of the Cisco WebEx Recording Format Player including versions before SP21 EP3 for T27LB and before SP22 for T27LC.
Yes, CVE-2010-3269 can be exploited remotely by an attacker through specially crafted WRF or ARF files.