Multiple stack-based buffer overflows in the Research in Motion RIM AxLoader ActiveX control in AxLoader.ocx and AxLoader.dll in BlackBerry Application Web Loader 1.0 allow remote attackers to execute arbitrary code via unspecified use of the (1) load or (2) loadJad method.
References
Link | Resource |
---|---|
http://blackberry.com/btsc/KB16248 | Patch Vendor Advisory |
http://www.microsoft.com/technet/security/advisory/960715.mspx | |
http://secunia.com/advisories/33847 | Vendor Advisory |
http://www.securityfocus.com/bid/33663 | |
http://osvdb.org/51833 | |
http://www.kb.cert.org/vuls/id/131100 | US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2009-02-10 14:30
Updated : 2009-02-16 22:57
NVD link : CVE-2009-0305
Mitre link : CVE-2009-0305
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
microsoft
- internet_explorer
research_in_motion_limited
- blackberry_application_web_loader