fkie_cve-2009-1260
Vulnerability from fkie_nvd
Published
2009-04-07 23:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:*:-:pe:*:*:*:*:*",
              "matchCriteriaId": "17F5DF7A-9903-43A9-9BD2-E13EFAB08439",
              "versionEndIncluding": "9.3.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC0D66CC-2BB9-42F2-AB1A-F2528F524235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:3.1_sr1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E500A39-2771-4755-9BB8-117CAD275958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:3.1_sr2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDA8DC52-D446-4610-85DB-FF370D2338B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5236E727-20BB-42A3-BAE1-A0243FED3633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1033E2-58A8-42A7-B782-BEA733CFE5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34021E37-E7F0-460A-A72D-936B8FB0EECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F6294A-3E02-4B37-AB76-E5BCC99F0462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "156623DE-C954-4470-97A0-87BB66AA0BA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:5.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42C26DB-5C2B-444A-A2CE-0EF9DE1C57AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:5.55_sr-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "199E347B-61BE-4EF9-A2B6-6D1998462E54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:5.55_sr-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF4B560-72DF-4FDB-B77B-60D8253B8B22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "75393582-C1D5-42FD-9C4D-4E39810A89E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE47C4E9-C4AB-48C7-814F-0F58E3F358CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B07F4F7-7C7C-4358-A304-02F5DFCA82AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE09B73F-A9F1-473E-9C0A-8CC144DD00A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC84B744-042C-4C83-A0D6-37F1934E35AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.52_sr-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7571790-24EA-4764-AB99-3F4AA792B81E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.52_sr-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7621A640-266C-4435-9770-1804F186CA36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.56_sr-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "806D55A4-F87D-49D0-AD72-A254FAEDF56B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:6.56_sr-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC8414A-FE5D-4343-842D-6FD1B6EB4BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.0:-:me:*:*:*:*:*",
              "matchCriteriaId": "9BF9EF37-892B-4314-9F57-95D11548E659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.1:-:me:*:*:*:*:*",
              "matchCriteriaId": "3BA4DAF7-72D5-47A9-ADD9-0274D8CBCCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.5:-:me:*:*:*:*:*",
              "matchCriteriaId": "12CC24A7-74D6-4FA5-B9F2-E0669D1E4E81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.6:-:me:*:*:*:*:*",
              "matchCriteriaId": "6AD36A09-943A-4B34-9439-34E0CACB1B13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.21_sr-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBAB8C09-472D-46D0-8AA7-B017A0D7DC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.21_sr-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "119B2B6F-E010-487F-A8BE-7929426E3C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.22_me:*:*:*:*:*:*:*",
              "matchCriteriaId": "C86A46AD-3BB8-4F5B-9F73-2A9BE6BD3B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.23:-:me:*:*:*:*:*",
              "matchCriteriaId": "995353BF-F882-44C4-8698-20AE41FDDF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.25:-:me:*:*:*:*:*",
              "matchCriteriaId": "7FB3582B-A19A-4D00-8D3C-47D73386E215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.51:-:me:*:*:*:*:*",
              "matchCriteriaId": "04F1A22F-80DF-4F0C-A6AE-4232327AF258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.52:-:me:*:*:*:*:*",
              "matchCriteriaId": "F2CB70BB-8DF2-4FCE-914C-BE5C6D8BF7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.55:-:me:*:*:*:*:*",
              "matchCriteriaId": "0ED81FD8-2DCD-44A7-B29D-EA537D8A76C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.56:-:me:*:*:*:*:*",
              "matchCriteriaId": "08DBBFF6-2B77-4B28-AEBE-51CC37F57169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.62:-:me:*:*:*:*:*",
              "matchCriteriaId": "FCE3C7D8-0DC3-442E-9733-7D05770E6D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.65:-:me:*:*:*:*:*",
              "matchCriteriaId": "A650E9E8-A2E1-420B-8EBC-4608ED2669F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.65_sr-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A65038-1900-44BF-BAAE-DA348A1C2274",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:7.66:-:me:*:*:*:*:*",
              "matchCriteriaId": "E3EBB8A7-1F10-4E4A-9965-C142976F335B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8:-:pe:*:*:*:*:*",
              "matchCriteriaId": "1A8AF672-11EF-4D00-9CB0-4C687C73D27E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.2:-:pe:*:*:*:*:*",
              "matchCriteriaId": "A2238638-682D-4EFD-A793-FB015D24AF0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.6:-:pe:*:*:*:*:*",
              "matchCriteriaId": "A7ABE1FD-F407-4A2A-80AC-798DAD000A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.12:-:pe:*:*:*:*:*",
              "matchCriteriaId": "CEA13675-CB4C-4ADB-911B-0834AED3504B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.51:-:pe:*:*:*:*:*",
              "matchCriteriaId": "63DD03D1-E0C9-47DB-98E6-CDA26193E53F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.61:-:pe:*:*:*:*:*",
              "matchCriteriaId": "3E2E7CD0-51CE-461B-9098-6341B6480298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.62:-:pe:*:*:*:*:*",
              "matchCriteriaId": "912F4170-8E12-400C-97C1-109396B5D8D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.63:-:pe:*:*:*:*:*",
              "matchCriteriaId": "E31327FF-B3CC-4236-BB84-B6DD2659A0EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.65:-:pe:*:*:*:*:*",
              "matchCriteriaId": "F6F3AF7A-AE94-4C94-BF1D-219B4454149B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:8.66:-:pe:*:*:*:*:*",
              "matchCriteriaId": "499BBD33-BE6A-42D6-9FC2-DE0D5A848E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:9.0:-:pe:*:*:*:*:*",
              "matchCriteriaId": "79ABC413-761B-4EB3-A9FC-B83EE5DAFC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:9.1.2:-:pe:*:*:*:*:*",
              "matchCriteriaId": "8D32892E-C508-469F-B06B-0F1C546106C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:9.2:-:pe:*:*:*:*:*",
              "matchCriteriaId": "94B835E1-8E67-46FE-B9C6-854525DCF0C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:9.3:-:pe:*:*:*:*:*",
              "matchCriteriaId": "266CEA1B-5C88-4A66-BD7B-53EC2750575C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:9.3.1:-:pe:*:*:*:*:*",
              "matchCriteriaId": "4C9B2E61-9531-478C-AF8A-F16439F0A221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ezbsystems:ultraiso:9.3.2:-:pe:*:*:*:*:*",
              "matchCriteriaId": "375D5262-2DE1-4056-A010-F171A852AFBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos del b\u00fafer basados en pila en UltraISO v9.3.3.2685 y versiones anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero (1) CCD o (2) IMG manipulado."
    }
  ],
  "id": "CVE-2009-1260",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-04-07T23:30:00.327",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/53275"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34581"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34363"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0935"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49672"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8343"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/53275"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0935"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8343"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…