CVE-2009-3930 : Detail

CVE-2009-3930

0.57%V3
Network
2009-11-10
18h00 +00:00
2009-11-24
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple integer overflows in Christos Zoulas file before 5.02 allow user-assisted remote attackers to have an unspecified impact via a malformed compound document (aka cdf) file that triggers a buffer overflow.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Christos_zoulas>>File >> Version To (including) 5.01

Christos_zoulas>>File >> Version 3.30

    Christos_zoulas>>File >> Version 3.31

      Christos_zoulas>>File >> Version 3.32

        Christos_zoulas>>File >> Version 3.33

          Christos_zoulas>>File >> Version 3.34

            Christos_zoulas>>File >> Version 3.36

              Christos_zoulas>>File >> Version 3.37

                Christos_zoulas>>File >> Version 3.38

                  Christos_zoulas>>File >> Version 3.39

                    Christos_zoulas>>File >> Version 3.40

                      Christos_zoulas>>File >> Version 3.41

                        Christos_zoulas>>File >> Version 4.01

                          Christos_zoulas>>File >> Version 4.02

                            Christos_zoulas>>File >> Version 4.03

                              Christos_zoulas>>File >> Version 4.04

                                Christos_zoulas>>File >> Version 4.06

                                  Christos_zoulas>>File >> Version 4.07

                                    Christos_zoulas>>File >> Version 4.08

                                      Christos_zoulas>>File >> Version 4.09

                                        Christos_zoulas>>File >> Version 4.11

                                          Christos_zoulas>>File >> Version 4.12

                                            Christos_zoulas>>File >> Version 4.13

                                              Christos_zoulas>>File >> Version 4.14

                                                Christos_zoulas>>File >> Version 4.15

                                                  Christos_zoulas>>File >> Version 4.16

                                                    Christos_zoulas>>File >> Version 4.17

                                                      Christos_zoulas>>File >> Version 4.19

                                                        Christos_zoulas>>File >> Version 4.20

                                                          Christos_zoulas>>File >> Version 4.21

                                                            Christos_zoulas>>File >> Version 4.23

                                                              Christos_zoulas>>File >> Version 4.24

                                                                Christos_zoulas>>File >> Version 4.25

                                                                  Christos_zoulas>>File >> Version 4.26

                                                                    Christos_zoulas>>File >> Version 5.00

                                                                    References

                                                                    http://mx.gw.com/pipermail/file/2009/000382.html
                                                                    Tags : mailing-list, x_refsource_MLIST
                                                                    http://www.securityfocus.com/bid/37074
                                                                    Tags : vdb-entry, x_refsource_BID