Описание
Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information.
Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-4771
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40863
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40864
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40867
- https://www.exploit-db.com/exploits/5193
- http://osvdb.org/42378
- http://osvdb.org/43007
- http://secunia.com/advisories/29131
- http://secunia.com/advisories/29145
- http://secunia.com/advisories/29146
- http://securityreason.com/securityalert/4517
- http://www.securityfocus.com/bid/28010
- http://www.vupen.com/english/advisories/2008/0685/references
- http://www.vupen.com/english/advisories/2008/0686/references
- http://www.vupen.com/english/advisories/2008/0687/references
Связанные уязвимости
Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information.