ID

VAR-200901-0402


CVE

CVE-2008-5260


TITLE

AXIS Camera Control of CamImage.CamImage.1 ActiveX Control heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-002732

DESCRIPTION

Heap-based buffer overflow in the CamImage.CamImage.1 ActiveX control in AxisCamControl.ocx in AXIS Camera Control 2.40.0.0 allows remote attackers to execute arbitrary code via a long image_pan_tilt property value. Failed attacks will likely cause denial-of-service conditions. Axis Camera Control 2.40.0.0 is vulnerable; other versions may also be vulnerable. The vulnerability is confirmed in version 2.40.0.0. Prior versions may also be affected. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-58/ Axis Communications: http://www.axis.com/techsup/software/acc/files/acc_security_update_090119.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ====================================================================== 2) Severity Rating: Highly critical Impact: System compromise Where: Remote ====================================================================== 3) Vendor's Description of Software "AXIS Camera Control (ActiveX component) makes it possible to view Motion JPEG video streams from an Axis Network Video product directly in Microsoft Development Tools and Microsoft Internet Explorer." Product Link: http://www.axis.com/techsup/software/acc/index.htm ====================================================================== 4) Description of Vulnerability Secunia Research has discovered a vulnerability in AXIS Camera Control, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code, but requires that the user is tricked into visiting and clicking a malicious web page. ====================================================================== 5) Solution The vendor recommends removing the ActiveX control and using AXIS Media Control as a replacement. ====================================================================== 6) Time Table 09/01/2009 - Vendor notified. 09/01/2009 - Vendor response. 23/01/2009 - Public disclosure. ====================================================================== 7) Credits Discovered by Alin Rad Pop, Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2008-5260 for the vulnerability. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-58/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ======================================================================

Trust: 2.16

sources: NVD: CVE-2008-5260 // JVNDB: JVNDB-2009-002732 // BID: 33408 // VULHUB: VHN-35385 // PACKETSTORM: 74279 // PACKETSTORM: 74271

IOT TAXONOMY

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:axismodel:camera controlscope:eqversion:2.40.0.0

Trust: 2.4

vendor:axismodel:communications camera controlscope:eqversion:2.40.0

Trust: 0.3

sources: BID: 33408 // JVNDB: JVNDB-2009-002732 // CNNVD: CNNVD-200901-326 // NVD: CVE-2008-5260

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-5260
value: HIGH

Trust: 1.0

NVD: CVE-2008-5260
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200901-326
value: CRITICAL

Trust: 0.6

VULHUB: VHN-35385
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-5260
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-35385
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-35385 // JVNDB: JVNDB-2009-002732 // CNNVD: CNNVD-200901-326 // NVD: CVE-2008-5260

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-35385 // JVNDB: JVNDB-2009-002732 // NVD: CVE-2008-5260

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200901-326

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200901-326

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002732

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-35385

PATCH

title:Top Pageurl:http://www.axis.com/techsup/software/acc/index.htm

Trust: 0.8

sources: JVNDB: JVNDB-2009-002732

EXTERNAL IDS

db:NVDid:CVE-2008-5260

Trust: 3.0

db:BIDid:33408

Trust: 2.0

db:SECUNIAid:33444

Trust: 1.8

db:VUPENid:ADV-2009-0228

Trust: 1.7

db:OSVDBid:51532

Trust: 1.7

db:JVNDBid:JVNDB-2009-002732

Trust: 0.8

db:CNNVDid:CNNVD-200901-326

Trust: 0.7

db:XFid:48176

Trust: 0.6

db:BUGTRAQid:20090123 SECUNIA RESEARCH: AXIS CAMERA CONTROL "IMAGE_PAN_TILT" PROPERTY BUFFER OVERFLOW

Trust: 0.6

db:PACKETSTORMid:74271

Trust: 0.2

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-35385

Trust: 0.1

db:PACKETSTORMid:74279

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-35385 // BID: 33408 // JVNDB: JVNDB-2009-002732 // PACKETSTORM: 74279 // PACKETSTORM: 74271 // CNNVD: CNNVD-200901-326 // NVD: CVE-2008-5260

REFERENCES

url:http://secunia.com/secunia_research/2008-58/

Trust: 2.2

url:http://www.axis.com/techsup/software/acc/files/acc_security_update_090119.pdf

Trust: 2.1

url:http://www.securityfocus.com/bid/33408

Trust: 1.7

url:http://osvdb.org/51532

Trust: 1.7

url:http://secunia.com/advisories/33444

Trust: 1.7

url:http://www.securityfocus.com/archive/1/500334/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/0228

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/48176

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5260

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5260

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/48176

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/500334/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2009/0228

Trust: 0.6

url:http://www.axis.com/products/camera_servers/index.htm

Trust: 0.3

url:/archive/1/500334

Trust: 0.3

url:http://secunia.com/advisories/business_solutions/

Trust: 0.2

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://secunia.com/advisories/product/14131/

Trust: 0.1

url:http://www.axis.com/techsup/software/amc/index.htm

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/33444/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/corporate/jobs/

Trust: 0.1

url:http://secunia.com/advisories/mailing_lists/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5260

Trust: 0.1

url:http://secunia.com/advisories/

Trust: 0.1

url:http://www.axis.com/techsup/software/acc/index.htm

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-35385 // BID: 33408 // JVNDB: JVNDB-2009-002732 // PACKETSTORM: 74279 // PACKETSTORM: 74271 // CNNVD: CNNVD-200901-326 // NVD: CVE-2008-5260

CREDITS

Alin Rad Pop, Secunia Research

Trust: 0.3

sources: BID: 33408

SOURCES

db:OTHERid: -
db:VULHUBid:VHN-35385
db:BIDid:33408
db:JVNDBid:JVNDB-2009-002732
db:PACKETSTORMid:74279
db:PACKETSTORMid:74271
db:CNNVDid:CNNVD-200901-326
db:NVDid:CVE-2008-5260

LAST UPDATE DATE

2025-04-10T21:27:20.238000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-35385date:2018-10-11T00:00:00
db:BIDid:33408date:2009-02-02T14:39:00
db:JVNDBid:JVNDB-2009-002732date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200901-326date:2009-01-29T00:00:00
db:NVDid:CVE-2008-5260date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-35385date:2009-01-26T00:00:00
db:BIDid:33408date:2009-01-19T00:00:00
db:JVNDBid:JVNDB-2009-002732date:2012-06-26T00:00:00
db:PACKETSTORMid:74279date:2009-01-23T16:28:38
db:PACKETSTORMid:74271date:2009-01-23T20:05:36
db:CNNVDid:CNNVD-200901-326date:2009-01-26T00:00:00
db:NVDid:CVE-2008-5260date:2009-01-26T15:30:00.267