Vulnerability Note VU#346278
AT&T Connect Participant Application for Windows v9.5.35 contains a stack-based buffer overflow vulnerability
AT&T Connect Participant Application for Windows v9.5.35 and possibly earlier versions contain a stack-based buffer overflow (CWE-121) vulnerability.
CWE-121: Stack-based Buffer Overflow
AT&T Connect Participant Application for Windows v9.5.35 and possibly earlier versions contain a stack-based buffer overflow vulnerability. AT&T Connect allows a user to join a web conference via a web browser. When joining a conference, AT&T provides the .SVT file for the user to open. Upon opening the file, the user is able to join the conference.
A remote unauthenticated attacker that is able to trick a user into opening a malicious .SVT file may be able to obtain sensitive information, cause a denial of service condition, or execute arbitrary code with the privileges of the application.
Apply an Update
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|AT&T||Affected||12 Sep 2013||04 Nov 2013|
CVSS Metrics (Learn More)
Thanks to Christopher Gabriel of Telos Corporation for reporting this vulnerability.
This document was written by Adam Rauf.
- CVE IDs: CVE-2013-6029
- Date Public: 12 Nov 2013
- Date First Published: 03 Dec 2013
- Date Last Updated: 03 Dec 2013
- Document Revision: 30
If you have feedback, comments, or additional information about this vulnerability, please send us email.