CVE-2011-2089
Published May 13, 2011
Last updated 7 years ago
Overview
- Description
- Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2854F716-ED09-46E8-AF9C-030EADDDB29F" }, { "criteria": "cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3214375-3D3A-47F9-BE1F-D92102A8C8F9" }, { "criteria": "cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0585FE5D-0FA5-4E13-AA5E-B5714564A14C" }, { "criteria": "cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E4B6521-EE6D-49FB-B771-830B34613007" }, { "criteria": "cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22060866-9121-480B-913A-41616CD94A27" }, { "criteria": "cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "278C55AD-294C-4D39-8E50-0726CA523A34" }, { "criteria": "cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B4F2D10-A4DD-4C7C-A5A8-BEDC23A413C2" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E01069E-E059-446B-A0C5-89C37C902D3D" }, { "criteria": "cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02BE61E1-12E1-46B3-B725-9A73EAD272B0" }, { "criteria": "cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7784C58-C8CF-4631-8171-67D95595FF79" }, { "criteria": "cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F303667-A48E-40D2-9C38-C9C2813020AF" }, { "criteria": "cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86628D9D-4270-4571-A57A-17962BC2027D" }, { "criteria": "cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EFFA7EA-6775-44B8-88ED-D1B6E4AE259A" }, { "criteria": "cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CDD1388-8FBF-4B3E-854E-B68D3EB6569B" } ], "operator": "OR" } ] } ]