The Particle Software IntraLaunch Application Launcher ActiveX control allows arbitrary code execution.
Particle Software IntraLaunch is an ActiveX control that "... allows web page links to execute anything from applications to associations such as Word or Acrobat PDF documents both locally and across a network without prompts or security warnings." The IntraLaunch ActiveX control, which is provided by IntraLaunch.ocx, is marked Safe for Scripting and by default is not restricted to any specific domain or Internet Explorer zone. This means that any web site has the ability to run arbitrary code on a system that has the control.
Note that a vendor may purchase a site-locked version of the IntraLaunch control, but by default the control is not restricted.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
We are currently unaware of a practical solution to this problem. Please consider the following workarounds:
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
|Date First Published:||2009-04-06|
|Date Last Updated:||2016-08-12 15:24 UTC|