vendor:
ProgramChecker ActiveX Control
by:
shinnai
7.5
CVSS
HIGH
Insecure Methods
284
CWE
Product Name: ProgramChecker ActiveX Control
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows XP Professional SP2 with Internet Explorer 7
Zenturi ProgramChecker ActiveX Control Multiple Insecure Methods
This exploit allows an attacker to delete the system.ini file on the target machine. The exploit is triggered by clicking a button on a webpage that utilizes the Zenturi ProgramChecker ActiveX control. The exploit prompts the user with a message asking if they want to run the exploit, and if they confirm, it will delete the system.ini file. This can cause the target machine to fail to restart properly. The exploit was tested on Windows XP Professional SP2 with Internet Explorer 7.
Mitigation:
To mitigate this vulnerability, users should avoid interacting with untrusted websites and ensure that they have up-to-date antivirus software installed. Additionally, disabling ActiveX controls in the browser settings can help prevent this exploit from being triggered.