[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] Gateway WebLaunch ActiveX Control Insecure Method
From:       <elazar () hushmail ! com>
Date:       2008-01-09 1:08:53
Message-ID: 20080109010853.B59FB2003A () mailserver7 ! hushmail ! com
[Download RAW message or body]

The DoWebLaunch() method of the Gateway WebLauncher ActiveX control 
allows for the execution or arbitrary application on a system, 
additionally this method is vulnerable to a buffer overflow in the 
2nd and 4th parameters. Both weblaunch.ocx and weblaunch2.ocx allow 
the execution of arbitrary files, weblaunch.ocx is vulnerable to 
the above mentioned buffer overflow, I have not checked 
weblaunch2.ocx. Exploit: http://www.milw0rm.com/exploits/4869

Elazar

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic