vendor:
Visual Basic
by:
UmZ (Umair Manzoor)
7.5
CVSS
HIGH
Stack Overflow
119
CWE
Product Name: Visual Basic
Affected Version From: Visual Basic 6
Affected Version To: Visual Basic 6
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2007
Visual Basic Project Stack Overflow
The vulnerability occurs when the project description (Project Property page and select Company Name) is opened. The affected version is Visual Basic 6. The vulnerability can be exploited to cause DoS or privilege escalation. Owned registers are ESI and EDI. The company name is dumped at Memory Address of : 04520020. Due to stack overflow, USER32 gets stuck in a loop, causing 100% CPU usage and making the system unstable. UNICODE exploitation must be implemented to exploit this vulnerability. The generated binary file does not display any vendor information in EXE format due to overflow.
Mitigation:
Apply patches or updates provided by the vendor. Avoid opening the project description.