Vulnerability Description
Use-after-free vulnerability in the addOSPLext method in the Honeywell ScanServer ActiveX control 780.0.20.5 allows remote attackers to execute arbitrary code via a crafted HTML document.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Honeywell | Scanserver Activex Control | 780.0.20.5 |
Related Weaknesses (CWE)
References
- http://osvdb.org/71249
- http://secunia.com/advisories/43360Vendor Advisory
- http://secunia.com/secunia_research/2011-22/Vendor Advisory
- http://www.securityfocus.com/bid/46930
- http://www.vupen.com/english/advisories/2011/0725
- http://osvdb.org/71249
- http://secunia.com/advisories/43360Vendor Advisory
- http://secunia.com/secunia_research/2011-22/Vendor Advisory
- http://www.securityfocus.com/bid/46930
- http://www.vupen.com/english/advisories/2011/0725
FAQ
What is CVE-2011-0331?
CVE-2011-0331 is a vulnerability with a CVSS score of 9.3 (HIGH). Use-after-free vulnerability in the addOSPLext method in the Honeywell ScanServer ActiveX control 780.0.20.5 allows remote attackers to execute arbitrary code via a crafted HTML document.
How severe is CVE-2011-0331?
CVE-2011-0331 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0331?
Check the references section above for vendor advisories and patch information. Affected products include: Honeywell Scanserver Activex Control.