{"cve": [{"lastseen": "2021-02-02T05:51:03", "description": "Heap-based buffer overflow in the SendLogAction method in the UUPlayer ActiveX control 6.0.0.1 in UUSee 2010 6.11.0609.2 might allow remote attackers to execute arbitrary code via a long argument.", "edition": 4, "cvss3": {}, "published": "2011-08-09T22:55:00", "title": "CVE-2011-2589", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2589"], "modified": "2017-08-29T01:29:00", "cpe": ["cpe:/a:uusee:uusee:2010_6.11.0609.2", "cpe:/a:uusee:uuplayer_activex_control:6.0.0.1"], "id": "CVE-2011-2589", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2589", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:uusee:uusee:2010_6.11.0609.2:*:*:*:*:*:*:*", "cpe:2.3:a:uusee:uuplayer_activex_control:6.0.0.1:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:51:03", "description": "The Play method in the UUPlayer ActiveX control 6.0.0.1 in UUSee 2010 6.11.0609.2 allows remote attackers to execute arbitrary programs via a UNC share pathname in the MPlayerPath parameter.", "edition": 4, "cvss3": {}, "published": "2011-08-09T22:55:00", "title": "CVE-2011-2590", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2590"], "modified": "2017-08-29T01:29:00", "cpe": ["cpe:/a:uusee:uusee:2010_6.11.0609.2", "cpe:/a:uusee:uuplayer_activex_control:6.0.0.1"], "id": "CVE-2011-2590", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2590", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:uusee:uusee:2010_6.11.0609.2:*:*:*:*:*:*:*", "cpe:2.3:a:uusee:uuplayer_activex_control:6.0.0.1:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-02T21:13:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2590", "CVE-2011-2589"], "description": "This host is installed with UUSee UUPlayer and is prone to multiple\nremote code execution vulnerabilities.", "modified": "2017-02-20T00:00:00", "published": "2011-08-31T00:00:00", "id": "OPENVAS:902563", "href": "http://plugins.openvas.org/nasl.php?oid=902563", "type": "openvas", "title": "UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_uusee_uuplayer_activex_mult_code_exec_vuln.nasl 5367 2017-02-20 14:16:52Z cfi $\n#\n# UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities\n#\n# Authors:\n# Sooraj KS <kssooraj@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation allows remote attackers to execute arbitrary\ncode in the context of the application using the ActiveX control. Failed exploit\nattempts will likely result in denial-of-service conditions.\n\nImpact Level: System/Application\";\n\ntag_affected = \"UUSee UUPlayer 2010 6.11.0609.2\";\n\ntag_insight = \"\n- A boundary error in the UUPlayer ActiveX control when handling\n the 'SendLogAction()' method can be exploited to cause a heap-based buffer\n overflow via an overly long argument.\n- An input validation error in the UUPlayer ActiveX control when handling\n the 'Play()' method can be exploited to execute an arbitrary program via\n a UNC path passed in the 'MPlayerPath' parameter.\";\n\ntag_solution = \"No solution or patch was made available for at least one year\nsince disclosure of this vulnerability. Likely none will be provided anymore.\nGeneral solution options are to upgrade to a newer release, disable respective\nfeatures, remove the product or replace the product by another one.\";\n\ntag_summary = \"This host is installed with UUSee UUPlayer and is prone to multiple\nremote code execution vulnerabilities.\";\n\nif(description)\n{\n script_id(902563);\n script_version(\"$Revision: 5367 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 15:16:52 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-31 10:37:30 +0200 (Wed, 31 Aug 2011)\");\n script_cve_id(\"CVE-2011-2589\", \"CVE-2011-2590\");\n script_bugtraq_id(48975);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/44885\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/68974\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/68975\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 SecPod\");\n script_family(\"General\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\n## Confirm Windows\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\n## Confirm Application\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\UUSEE\";\nif(!registry_key_exists(key:key)) {\n exit(0);\n}\n\n## Get Version\nversion = registry_get_sz(key:key, item:\"DisplayVersion\");\nif(version)\n{\n ## Check for UUSee UUPlayer 6.11.0609.2\n if(version_is_equal(version:version, test_version:\"6.11.0609.2\")) {\n security_message(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:40:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2590", "CVE-2011-2589"], "description": "This host is installed with UUSee UUPlayer and is prone to multiple\nremote code execution vulnerabilities.", "modified": "2018-10-20T00:00:00", "published": "2011-08-31T00:00:00", "id": "OPENVAS:1361412562310902563", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310902563", "type": "openvas", "title": "UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_uusee_uuplayer_activex_mult_code_exec_vuln.nasl 11997 2018-10-20 11:59:41Z mmartin $\n#\n# UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities\n#\n# Authors:\n# Sooraj KS <kssooraj@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.902563\");\n script_version(\"$Revision: 11997 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-20 13:59:41 +0200 (Sat, 20 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-31 10:37:30 +0200 (Wed, 31 Aug 2011)\");\n script_cve_id(\"CVE-2011-2589\", \"CVE-2011-2590\");\n script_bugtraq_id(48975);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/44885\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/68974\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/68975\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 SecPod\");\n script_family(\"General\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n script_tag(name:\"impact\", value:\"Successful exploitation allows remote attackers to execute arbitrary\ncode in the context of the application using the ActiveX control. Failed exploit\nattempts will likely result in denial-of-service conditions.\");\n script_tag(name:\"affected\", value:\"UUSee UUPlayer 2010 6.11.0609.2\");\n script_tag(name:\"insight\", value:\"- A boundary error in the UUPlayer ActiveX control when handling\n the 'SendLogAction()' method can be exploited to cause a heap-based buffer\n overflow via an overly long argument.\n\n - An input validation error in the UUPlayer ActiveX control when handling\n the 'Play()' method can be exploited to execute an arbitrary program via\n a UNC path passed in the 'MPlayerPath' parameter.\");\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year since the disclosure\n of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer\n release, disable respective features, remove the product or replace the product by another one.\");\n script_tag(name:\"summary\", value:\"This host is installed with UUSee UUPlayer and is prone to multiple\nremote code execution vulnerabilities.\");\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\UUSEE\";\nif(!registry_key_exists(key:key)) {\n exit(0);\n}\n\nversion = registry_get_sz(key:key, item:\"DisplayVersion\");\nif(version)\n{\n if(version_is_equal(version:version, test_version:\"6.11.0609.2\")) {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}