ActiveX Object Memory Corruption VulnerabilityID: oval:org.mitre.oval:def:5481 | Date: (C)2008-02-13 (M)2022-10-10 |
Class: VULNERABILITY | Family: windows |
Stack-based buffer overflow in certain ActiveX controls in (1) FPOLE.OCX 6.0.8450.0 and (2) Foxtlib.ocx, as used in the Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library; and Internet Explorer 5.01, 6 SP1 and SP2, and 7; allows remote attackers to execute arbitrary code via a long first argument to the FoxDoCmd function.
Platform: |
Microsoft Windows 2000 |
Microsoft Windows XP |
Microsoft Windows Server 2003 |
Microsoft Windows Vista |
Product: |
Microsoft Internet Explorer |