Vulnerability Note VU#180513
Microsoft Video ActiveX control stack buffer overflow
The Microsoft Video ActiveX control contains a stack buffer overflow vulnerability, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Microsoft Windows comes with an ActiveX component called "ActiveX control for streaming video," which is provided by msvidctl.dll. This component provides a number of Class Identifiers (CLSIDs) that are marked as Safe for Scripting and Safe for Initialization, which means that they can be used by Internet Explorer. The ActiveX controls provided by msvidctl.dll fail to properly handle file input, which can result in stack memory corruption. This can allow the Structured Exception Handler (SEH) to be overwritten, thus allowing subversion of the program execution flow.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Microsoft has released an update to address this issue. See Microsoft Security Bulletin MS09-032 for more information.
Disable the vulnerable ActiveX controls
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||15 Jul 2009|
CVSS Metrics (Learn More)
This document was written by Will Dormann.
- CVE IDs: CVE-2008-0015
- US-CERT Alert: TA09-187A; TA09-195A
- Date Public: 04 Jul 2009
- Date First Published: 06 Jul 2009
- Date Last Updated: 15 Jul 2009
- Severity Metric: 65.31
- Document Revision: 24
If you have feedback, comments, or additional information about this vulnerability, please send us email.