Vulnerability Note VU#908801
Particle Software IntraLaunch Application Launcher ActiveX control fails to restrict access to dangerous methods
The Particle Software IntraLaunch Application Launcher ActiveX control allows arbitrary code execution.
Particle Software IntraLaunch is an ActiveX control that "... allows web page links to execute anything from applications to associations such as Word or Acrobat PDF documents both locally and across a network without prompts or security warnings." The IntraLaunch ActiveX control, which is provided by IntraLaunch.ocx, is marked Safe for Scripting and by default is not restricted to any specific domain or Internet Explorer zone. This means that any web site has the ability to run arbitrary code on a system that has the control.
Note that a vendor may purchase a site-locked version of the IntraLaunch control, but by default the control is not restricted.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
We are currently unaware of a practical solution to this problem. Please consider the following workarounds:
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|LDRA Software Technology||Affected||09 Mar 2009||12 Aug 2016|
|Particle Software||Affected||13 Feb 2009||12 Aug 2016|
CVSS Metrics (Learn More)
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
- CVE IDs: CVE-2009-0218
- Date Public: 07 Jun 97
- Date First Published: 06 Apr 2009
- Date Last Updated: 12 Aug 2016
- Severity Metric: 9.62
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.