CVE-2012-5003
Published Sep 19, 2012
Last updated 7 years ago
Overview
- Description
- nxapplet.jar in No Machine NX Web Companion 3.x and earlier does not properly verify the authenticity of updates, which allows user-assisted remote attackers to execute arbitrary code via a crafted (1) SiteUrl or (2) RedirectUrl parameter that points to a Trojan Horse client.zip update file.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F298A07A-100E-4097-9A3B-A68021277DD5", "versionEndIncluding": "3.5.0-2" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:1.5.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62F6E74C-79CE-40C2-9DB9-74F63A1402E6" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:1.5.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DFE4C73-58E4-466D-A1DC-890A4CB0224A" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:2.0.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C12A898-5576-4389-966C-77F361548345" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:2.1.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3A23FCD-F353-48DE-B9F0-3055BAD3E61B" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.0.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3870DF71-9093-4C15-822F-85D038203A2B" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.0.0-2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAB6DF3E-4F70-470F-8327-EB09D4E90682" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.0.0-3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D37DF8A-35FB-4E6F-9246-1C13807FF3BA" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.0.0-4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED32481E-D88A-4FC6-A9E4-CCAB6405EB13" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.0.0-5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14667D0C-A745-4B84-A1F9-1636352F7A1C" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.1.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A06F28C-4C69-446D-8EC4-DF0F970496EA" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.2.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E1BE7D6-8AC5-41A5-8A51-0C7EE1630F3F" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.3.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7DD295F-11EF-4676-9A9B-242E8078D7B6" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.3.0-2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C543CE60-9E29-4A01-8687-97BAF6D29C26" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.4.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "986924D3-4A0E-484B-B422-5EA0B58C0B1E" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.4.0-2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52D4AF65-0534-468A-AA71-AD9B4620FDD4" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.4.0-3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "105291C2-33B1-4998-908B-50472A02CF7D" }, { "criteria": "cpe:2.3:a:nomachine:nx_web_companion:3.5.0-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB3E6F48-7074-4BFD-87B6-B10F3754CAB7" } ], "operator": "OR" } ] } ]