| CVE ID | CVE-2015-6946 |
| CVSS SCORE | 9.3, AV:N/AC:M/Au:N/C:C/I:C/A:C |
| AFFECTED VENDORS |
Borland |
| AFFECTED PRODUCTS |
AccuRev |
| TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['20294']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
| VULNERABILITY DETAILS |
The specific flaw exists within the activate_doit function of the service. The issue lies in the handling of the actserver parameter which can result in overflowing a stack-based buffer. An attacker could leverage this vulnerability to execute code under the context of SYSTEM. |
| ADDITIONAL DETAILS |
07/09/2015 - ZDI emailed vendor and requested contact -- Mitigation:
|
| DISCLOSURE TIMELINE |
|
| CREDIT | rgod |