[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-2511

Date: (C)2008-06-02   (M)2017-10-04
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Directory traversal vulnerability in the UmxEventCli.CachedAuditDataList.1 (aka UmxEventCliLib) ActiveX control in UmxEventCli.dll in CA Internet Security Suite 2008 allows remote attackers to create and overwrite arbitrary files via a .. (dot dot) in the argument to the SaveToFile method. NOTE: this can be leveraged for code execution by writing to a Startup folder. NOTE: some of these details are obtained from third party information.

Reference:
SECTRACK-1020129
http://www.securityfocus.com/archive/1/archive/1/492679/100/0/threaded
SECUNIA-30420
EXPLOIT-DB-5682
ADV-2008-1696
http://retrogod.altervista.org/9sg_CA_poc.html
internet-security-umxeventcli-file-overwrite(42712)

CWE    1
CWE-22

© 2013 SecPod Technologies