[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20080109010853.B59FB2003A@mailserver7.hushmail.com>
Date: Tue, 08 Jan 2008 20:08:53 -0500
From: <elazar@...hmail.com>
To: <full-disclosure@...ts.grok.org.uk>
Cc:
Subject: Gateway WebLaunch ActiveX Control Insecure Method
The DoWebLaunch() method of the Gateway WebLauncher ActiveX control
allows for the execution or arbitrary application on a system,
additionally this method is vulnerable to a buffer overflow in the
2nd and 4th parameters. Both weblaunch.ocx and weblaunch2.ocx allow
the execution of arbitrary files, weblaunch.ocx is vulnerable to
the above mentioned buffer overflow, I have not checked
weblaunch2.ocx. Exploit: http://www.milw0rm.com/exploits/4869
Elazar
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists