Computer Security
[EN] securityvulns.ru no-pyccku


DAZ Studio code execution
Published:04.12.2009
Source:
SecurityVulns ID:10439
Type:local
Threat Level:
3/10
Description:Code execution via .ds, .dsa, .dse, .dsb.
Affected:DAZ3D : DAZ Studio 3.0
 DAZ3D : DAZ Studio 2.3
CVE:CVE-2009-4148 (DAZ Studio 2.3.3.161, 2.3.3.163, and 3.0.1.135 allows remote attackers to execute arbitrary JavaScript code via a (1) .ds, (2) .dsa, (3) .dse, or (4) .dsb file, as demonstrated by code that loads the WScript.Shell ActiveX control, related to a "script injection vulnerability.")
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2009-0911: DAZ Studio Arbitrary Command Execution (04.12.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod