Zenturi ProgramChecker ActiveX Control Fill Method Stack Based Buffer Overflow Vulnerability

Zenturi ProgramChecker ActiveX control is prone to a stack-based buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

ProgramChecker is vulnerable; other versions may also be affected.


Privacy Statement
Copyright 2010, SecurityFocus