First published: Wed Dec 04 2013(Updated: )
Stack-based buffer overflow in the AT&T Connect Participant Application before 9.5.51 on Windows allows remote attackers to execute arbitrary code via a malformed .SVT file.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Att Connect Participant Application | <=9.5.0 | |
Att Connect Participant Application | =8.5.71 | |
Att Connect Participant Application | =8.9.35 | |
Att Connect Participant Application | =9.0.0 | |
Att Connect Participant Application | =9.0.82 | |
Att Connect Participant Application | =9.2.0 | |
Att Connect Participant Application | =9.3.0 | |
Att Connect Participant Application | =9.3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6029 has a high severity rating due to its potential for remote code execution.
To fix CVE-2013-6029, update the AT&T Connect Participant Application to version 9.5.51 or later.
CVE-2013-6029 allows remote attackers to execute arbitrary code on affected systems.
CVE-2013-6029 affects AT&T Connect Participant Application versions prior to 9.5.51, including versions 8.5.71, 8.9.35, 9.0.0, 9.0.82, 9.2.0, 9.3.0, and 9.3.14.
There are no known workarounds for CVE-2013-6029; updating to the latest version is the recommended action.