Vulnerability Description
Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions before 10.8.9, allows local users to execute arbitrary code via a long string in a (1) TREENAME or (2) GROUPNAME Policy file (spd).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Safenet-Inc | Softremote | <= 10.8.8 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/archive/1/507593/100/0/threaded
- http://www.securitytracker.com/id?1023117
- http://www.senseofsecurity.com.au/advisories/SOS-09-008Vendor AdvisoryURL Repurposed
- http://www.vupen.com/english/advisories/2009/3108Vendor Advisory
- http://www.securityfocus.com/archive/1/507593/100/0/threaded
- http://www.securitytracker.com/id?1023117
- http://www.senseofsecurity.com.au/advisories/SOS-09-008Vendor AdvisoryURL Repurposed
- http://www.vupen.com/english/advisories/2009/3108Vendor Advisory
FAQ
What is CVE-2009-3861?
CVE-2009-3861 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions before 10.8.9, allows local users to execute arbitrary code via a long string in a ...
How severe is CVE-2009-3861?
CVE-2009-3861 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-3861?
Check the references section above for vendor advisories and patch information. Affected products include: Safenet-Inc Softremote.