Search criteria

3 vulnerabilities found for desktop_manager by logitech

FKIE_CVE-2008-0956

Vulnerability from fkie_nvd - Published: 2008-06-12 02:32 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors.
References
cret@cert.orghttp://backweb.com/news_events/press_releases/051608.phpURL Repurposed
cret@cert.orghttp://marc.info/?l=bugtraq&m=121380194923597&w=2
cret@cert.orghttp://secunia.com/advisories/30598Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30625Vendor Advisory
cret@cert.orghttp://www.kb.cert.org/vuls/id/216153Patch, US Government Resource
cret@cert.orghttp://www.securityfocus.com/bid/29558
cret@cert.orghttp://www.us-cert.gov/cas/techalerts/TA08-162B.htmlUS Government Resource
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1791
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1792
cret@cert.orghttps://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032
cret@cert.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/42991
af854a3a-2127-422b-91ae-364da2661108http://backweb.com/news_events/press_releases/051608.phpURL Repurposed
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=121380194923597&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30598Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30625Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/216153Patch, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29558
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA08-162B.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1791
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1792
af854a3a-2127-422b-91ae-364da2661108https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/42991
Impacted products
Vendor Product Version
backweb backweb *
logitech desktop_manager *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:backweb:backweb:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6C64B4-5C70-4407-85C5-9C378D9C6C93",
              "versionEndIncluding": "8.1.1.86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:logitech:desktop_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "390E21E8-0B91-40E7-9D1F-5FDB30BFDAE1",
              "versionEndIncluding": "2.55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en el control ActiveX BackWeb Lite Install Runner en el objeto BackWeb Web Package ActiveX en LiteInstActivator.dll en  BackWeb antes de 8.1.1.87, tal como es utilizado en Logitech Desktop Manager (LDM) antes de 2.56, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2008-0956",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-06-12T02:32:00.000",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "URL Repurposed"
      ],
      "url": "http://backweb.com/news_events/press_releases/051608.php"
    },
    {
      "source": "cret@cert.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30598"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30625"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/216153"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/29558"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1791"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1792"
    },
    {
      "source": "cret@cert.org",
      "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032"
    },
    {
      "source": "cret@cert.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42991"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "URL Repurposed"
      ],
      "url": "http://backweb.com/news_events/press_releases/051608.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30598"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/216153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/29558"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1792"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42991"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-0956 (GCVE-0-2008-0956)

Vulnerability from cvelistv5 – Published: 2008-06-12 01:30 – Updated: 2024-08-07 08:01
VLAI?
Summary
Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.kb.cert.org/vuls/id/216153 third-party-advisoryx_refsource_CERT-VN
http://www.vupen.com/english/advisories/2008/1791 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/29558 vdb-entryx_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA08-162B.html third-party-advisoryx_refsource_CERT
http://www.vupen.com/english/advisories/2008/1792 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30625 third-party-advisoryx_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121380194923597&w=2 vendor-advisoryx_refsource_HP
http://secunia.com/advisories/30598 third-party-advisoryx_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121380194923597&w=2 vendor-advisoryx_refsource_HP
https://docs.microsoft.com/en-us/security-updates… vendor-advisoryx_refsource_MS
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://backweb.com/news_events/press_releases/051… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:40.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#216153",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/216153"
          },
          {
            "name": "ADV-2008-1791",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1791"
          },
          {
            "name": "29558",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29558"
          },
          {
            "name": "TA08-162B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
          },
          {
            "name": "ADV-2008-1792",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1792"
          },
          {
            "name": "30625",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30625"
          },
          {
            "name": "HPSBST02344",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
          },
          {
            "name": "30598",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30598"
          },
          {
            "name": "SSRT080087",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
          },
          {
            "name": "MS08-032",
            "tags": [
              "vendor-advisory",
              "x_refsource_MS",
              "x_transferred"
            ],
            "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032"
          },
          {
            "name": "backweb-activex-liteinstactivator-bo(42991)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42991"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://backweb.com/news_events/press_releases/051608.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-12T19:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#216153",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/216153"
        },
        {
          "name": "ADV-2008-1791",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1791"
        },
        {
          "name": "29558",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29558"
        },
        {
          "name": "TA08-162B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
        },
        {
          "name": "ADV-2008-1792",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1792"
        },
        {
          "name": "30625",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30625"
        },
        {
          "name": "HPSBST02344",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
        },
        {
          "name": "30598",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30598"
        },
        {
          "name": "SSRT080087",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
        },
        {
          "name": "MS08-032",
          "tags": [
            "vendor-advisory",
            "x_refsource_MS"
          ],
          "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032"
        },
        {
          "name": "backweb-activex-liteinstactivator-bo(42991)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42991"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://backweb.com/news_events/press_releases/051608.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2008-0956",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#216153",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/216153"
            },
            {
              "name": "ADV-2008-1791",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1791"
            },
            {
              "name": "29558",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29558"
            },
            {
              "name": "TA08-162B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
            },
            {
              "name": "ADV-2008-1792",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1792"
            },
            {
              "name": "30625",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30625"
            },
            {
              "name": "HPSBST02344",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
            },
            {
              "name": "30598",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30598"
            },
            {
              "name": "SSRT080087",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
            },
            {
              "name": "MS08-032",
              "refsource": "MS",
              "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032"
            },
            {
              "name": "backweb-activex-liteinstactivator-bo(42991)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42991"
            },
            {
              "name": "http://backweb.com/news_events/press_releases/051608.php",
              "refsource": "CONFIRM",
              "url": "http://backweb.com/news_events/press_releases/051608.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2008-0956",
    "datePublished": "2008-06-12T01:30:00",
    "dateReserved": "2008-02-25T00:00:00",
    "dateUpdated": "2024-08-07T08:01:40.085Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0956 (GCVE-0-2008-0956)

Vulnerability from nvd – Published: 2008-06-12 01:30 – Updated: 2024-08-07 08:01
VLAI?
Summary
Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.kb.cert.org/vuls/id/216153 third-party-advisoryx_refsource_CERT-VN
http://www.vupen.com/english/advisories/2008/1791 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/29558 vdb-entryx_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA08-162B.html third-party-advisoryx_refsource_CERT
http://www.vupen.com/english/advisories/2008/1792 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30625 third-party-advisoryx_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121380194923597&w=2 vendor-advisoryx_refsource_HP
http://secunia.com/advisories/30598 third-party-advisoryx_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121380194923597&w=2 vendor-advisoryx_refsource_HP
https://docs.microsoft.com/en-us/security-updates… vendor-advisoryx_refsource_MS
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://backweb.com/news_events/press_releases/051… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:40.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#216153",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/216153"
          },
          {
            "name": "ADV-2008-1791",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1791"
          },
          {
            "name": "29558",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29558"
          },
          {
            "name": "TA08-162B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
          },
          {
            "name": "ADV-2008-1792",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1792"
          },
          {
            "name": "30625",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30625"
          },
          {
            "name": "HPSBST02344",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
          },
          {
            "name": "30598",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30598"
          },
          {
            "name": "SSRT080087",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
          },
          {
            "name": "MS08-032",
            "tags": [
              "vendor-advisory",
              "x_refsource_MS",
              "x_transferred"
            ],
            "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032"
          },
          {
            "name": "backweb-activex-liteinstactivator-bo(42991)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42991"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://backweb.com/news_events/press_releases/051608.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-12T19:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#216153",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/216153"
        },
        {
          "name": "ADV-2008-1791",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1791"
        },
        {
          "name": "29558",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29558"
        },
        {
          "name": "TA08-162B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
        },
        {
          "name": "ADV-2008-1792",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1792"
        },
        {
          "name": "30625",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30625"
        },
        {
          "name": "HPSBST02344",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
        },
        {
          "name": "30598",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30598"
        },
        {
          "name": "SSRT080087",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
        },
        {
          "name": "MS08-032",
          "tags": [
            "vendor-advisory",
            "x_refsource_MS"
          ],
          "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032"
        },
        {
          "name": "backweb-activex-liteinstactivator-bo(42991)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42991"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://backweb.com/news_events/press_releases/051608.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2008-0956",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#216153",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/216153"
            },
            {
              "name": "ADV-2008-1791",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1791"
            },
            {
              "name": "29558",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29558"
            },
            {
              "name": "TA08-162B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
            },
            {
              "name": "ADV-2008-1792",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1792"
            },
            {
              "name": "30625",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30625"
            },
            {
              "name": "HPSBST02344",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
            },
            {
              "name": "30598",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30598"
            },
            {
              "name": "SSRT080087",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=121380194923597\u0026w=2"
            },
            {
              "name": "MS08-032",
              "refsource": "MS",
              "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032"
            },
            {
              "name": "backweb-activex-liteinstactivator-bo(42991)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42991"
            },
            {
              "name": "http://backweb.com/news_events/press_releases/051608.php",
              "refsource": "CONFIRM",
              "url": "http://backweb.com/news_events/press_releases/051608.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2008-0956",
    "datePublished": "2008-06-12T01:30:00",
    "dateReserved": "2008-02-25T00:00:00",
    "dateUpdated": "2024-08-07T08:01:40.085Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}