Vulnerability Description
Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Macintosh 4.04 allows user-assisted attackers to execute arbitrary code via a crafted .AMHH file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nucleustechnologies | Kernel Recovery | 4.04 |
Related Weaknesses (CWE)
References
- http://osvdb.org/54224
- http://secunia.com/advisories/34860Vendor Advisory
- http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Macintosh-v-4-04-BufURL Repurposed
- http://www.insight-tech.org/xploits/KernelrecoveryforMacintoshv.4.04BufferOverflExploitURL Repurposed
- http://www.securityfocus.com/bid/34846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50345
- http://osvdb.org/54224
- http://secunia.com/advisories/34860Vendor Advisory
- http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Macintosh-v-4-04-BufURL Repurposed
- http://www.insight-tech.org/xploits/KernelrecoveryforMacintoshv.4.04BufferOverflExploitURL Repurposed
- http://www.securityfocus.com/bid/34846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50345
FAQ
What is CVE-2009-1640?
CVE-2009-1640 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Macintosh 4.04 allows user-assisted attackers to execute arbitrary code via a crafted .AMHH file.
How severe is CVE-2009-1640?
CVE-2009-1640 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1640?
Check the references section above for vendor advisories and patch information. Affected products include: Nucleustechnologies Kernel Recovery.