Microsoft Windows 2000 ActiveX...

- AV AC AU C I A
发布: 2000-11-02
修订: 2025-04-13

An unchecked buffer exists in the System Monitor ActiveX Control included with Microsoft Windows 2000 (sysmon.ocx, classid:C4D2D8E0-D1DD-11CE-940F-008029004347). Depending on the data entered when invoking the ActiveX control, a malicious user could either launch a denial of service attack or execute arbitrary code on a remote system. This can be exploited remotely via either a web browser or html-complaint email, provided that ACtiveX is enabled in the browser or mail client. The problem is in the LogFileName parameter supplied to the control. If the length of the data entered as this value is longer than 2000 characters, memory containing executable code will be overwritten with the remotely-supplied data. This data will then be executed on the target system at the current user's privilege level.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息