vendor:
WebLaunch
by:
e.b.
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: WebLaunch
Affected Version From: 1.0.0.1
Affected Version To: 1.0.0.1
Patch Exists: Yes
Related CWE: CVE-2006-4010
CPE: a:gateway:weblaunch
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2006
Gateway WebLaunch Buffer Overflow Exploit
This exploit is a buffer overflow vulnerability in the Gateway WebLaunch ActiveX control. It allows an attacker to execute arbitrary code on the vulnerable system. The exploit was tested on Windows XP SP2 (fully patched) English, IE6, Weblaunch.ocx: {93CEA8A4-6059-4E0B-ADDD-73848153DD5E} and Weblaunch2.ocx: {97BB6657-DC7F-4489-9067-51FAB9D8857E}. The exploit was written by e.b. and thanks to h.d.m. and the Metasploit crew.
Mitigation:
The vulnerability can be mitigated by disabling the vulnerable ActiveX control or by setting the kill bit for the control.