Vulnerability Name: | CVE-2010-1909 (CCN-58368) | ||||||||
Assigned: | 2010-04-16 | ||||||||
Published: | 2010-04-16 | ||||||||
Updated: | 2018-10-10 | ||||||||
Summary: | Buffer overflow in the RunCmd method in the SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to execute arbitrary code via vectors involving "CreateProcess params." Note: some of these details are obtained from third party information. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C) 5.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-1909 Source: CCN Type: SA39751 Consona SdcUser.TgConCtl ActiveX Control Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 39751 Source: MISC Type: UNKNOWN http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html Source: CCN Type: Consona CRM Inc. Security Bulletin For Consona Live Assistance Consona Dynamic Agent Consona Subscriber Assistance Source: CCN Type: US-CERT VU#602801 Consona (formerly SupportSoft) Intelligent Assistance Suite (IAS) cross-site scripting, ActiveX, and Repair Service vulnerabilities Source: CERT-VN Type: Patch, US Government Resource VU#602801 Source: CCN Type: OSVDB ID: 64505 Consona SdcUser.TgConCtl ActiveX (tgctlcm.dll) RunCMD Method Overflow Source: BUGTRAQ Type: UNKNOWN 20100507 [Wintercore Research] Consona Products - Multiple vulnerabilities Source: CCN Type: BID-40006 Multiple Consona Products 'SdcUser.TgConCtl' ActiveX Control Buffer Overflow Vulnerability Source: CCN Type: Congreso de Seguridad ~ Rooted CONÂ’2010 RELEASING A 0DAY AT ROOTEDCON The Case of Consona/SupportSoft Source: MISC Type: Exploit http://www.wintercore.com/downloads/rootedcon_0day.pdf Source: XF Type: UNKNOWN consona-activex-bo(58368) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |