‫ CrazyTalk Web Player CrazyTalk4 ActiveX Control Buffer Overflow Vulnerability

IRCAD2012031796
ID: IRCAD2012031796
Release Date: 2012-03-20
Criticality level: Highly critical
Software:
CrazyTalk Web Player 4.x
CrazyTalk4 ActiveX Control 4.x
Description:
A vulnerability has been discovered in CrazyTalk Web Player, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in the CrazyTalk4 ActiveX control within the CrazyTalk4Native.dll module when handling certain properties. This can be exploited to cause a stack-based buffer overflow via an overly long string assigned to the "BackImage", "ScriptName", "ModelName", and "SRC" properties.
Successful exploitation allows execution of arbitrary code.
The vulnerability is confirmed in version 4.6.828.1. Other versions may also be affected.
Solution
Set the kill-bit for the ActiveX control.
References:
Secunia:
 

نظرات

بدون نظر
شما برای نظر دادن باید وارد شوید

نوشته

 
تاریخ ایجاد: 3 فروردین 1391

امتیاز

امتیاز شما
تعداد امتیازها:0