CVE-2009-0812
Published Mar 4, 2009
Last updated 6 years ago
Overview
- Description
- Stack-based buffer overflow in BreakPoint Software Hex Workshop 4.23, 6.0.1.4603, and other 6.x and earlier versions allows remote attackers to execute arbitrary code via a crafted Intel Hex Code (.hex) file. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10DED104-0B96-4AED-ACBA-A8F0D10FFCDC", "versionEndIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA15841A-9389-4846-8C1D-18DDC513C50C" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:2.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A6BF4ED-54D1-4252-97A7-BD5DAE30A037" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:2.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "100360DA-9566-411A-968D-EDB58F1A30D6" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25ECAAA7-CC59-40B7-B800-60E58956A3FE" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:2.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9E45C25-7A1E-4FCB-B51C-F9A0A7BA0ECA" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:2.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2916C7C9-FE67-49F4-A937-56530680CD0F" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:2.52:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9C61A13-C7B2-46F0-814B-8C52599F8CBF" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:2.53:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09B6CA27-D136-4769-AB4E-C40AAC6A4FA8" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:2.54:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2A02F57-8428-4355-BF5F-A11A6BCE1F04" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:3.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBECCF0A-79B0-4C1D-8879-184C78ECAD30" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:3.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70FCF22E-5217-4B64-8960-11D65F21E59B" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20D370D9-6907-4AC2-89CB-D6936728D2DF" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F49B1C6-C892-49E2-AA22-9DE33609696B" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:4.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E55B2ACC-13C5-4FF0-8BD1-B143F8A7161B" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C136606A-10DB-424C-A230-0E1640778A55" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:4.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4CD53A9-BC06-4307-8009-4CC3AD194168" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:4.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46A12319-9479-493A-88E7-2F07485E0059" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:4.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7353520-10FF-45A8-8B91-26DA53CAA6A1" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:4.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7854DC8E-B375-40F9-B057-0CEE9D635C04" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FB64D21-9A73-40AA-98F5-6BF5CA03396F" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB87CACB-DC30-4508-839C-7BFF9C56BD47" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:5.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1434BD6A-F2F4-4A1F-ACE9-600E6DB0A878" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:5.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAD8E03A-2B59-4015-8A46-70B8C7494392" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:5.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F94FBC7-8643-4F08-902F-55B1EFF6F3E3" }, { "criteria": "cpe:2.3:a:bpsoft:hex_workshop:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E702A091-AC4B-4B83-BFE4-D6494A779CAC" } ], "operator": "OR" } ] } ]