Vulnerability Description
Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Shemes | Grabit | <= 1.7.2 |
Related Weaknesses (CWE)
References
- http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html
- http://osvdb.org/54205
- http://secunia.com/advisories/34893Vendor Advisory
- http://www.securityfocus.com/archive/1/503184/100/0/threaded
- http://www.securityfocus.com/bid/34807
- http://www.securitytracker.com/id?1022161
- http://www.shemes.com/index.php?p=whatsnewPatchVendor Advisory
- http://www.vupen.com/english/advisories/2009/1243Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50310
- https://www.exploit-db.com/exploits/8612
- http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html
- http://osvdb.org/54205
- http://secunia.com/advisories/34893Vendor Advisory
- http://www.securityfocus.com/archive/1/503184/100/0/threaded
- http://www.securityfocus.com/bid/34807
FAQ
What is CVE-2009-1586?
CVE-2009-1586 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and earlier allows remote attackers to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB ...
How severe is CVE-2009-1586?
CVE-2009-1586 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1586?
Check the references section above for vendor advisories and patch information. Affected products include: Shemes Grabit.