Zero-day Vulnerability Database

Change view:

Zero-day vulnerabilities discovered: 2

Remote code execution in Baofeng Storm ActiveX control
CVE-2009-1807

Stack-based buffer overflow

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to stack-based buffer overflow in ActiveX control (Config.dll). A remote attacker can create a specially crafted Web page that passes an overly long string to the SetAttributeValue() method, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.
Not patched
i

The zero-day was exploited in April and May in 2009. It is unclear if vendor has ever issued a patch.

Software: Storm

The zero-day was exploited in April and May in 2009. It is unclear if vendor has ever issued a patch.

Remote code execution in Baofeng Storm ActiveX control
CVE-2009-1612

Stack-based buffer overflow

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to stack-based buffer overflow in Storm ActiveX control (mps.dll)). A remote attacker can create a specially crafted Web page that passes an overly long string to the OnBeforeVideoDownload() method, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.
Not patched
i

Exploited in April and May 2009.

Software: Storm

Known/fameous malware:

The attack using the vulnerability was traced to the far east; specifically, China and Taiwan.

Exploited in April and May 2009.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.