Hewlett Packard HPQVWOCX.DLL ActiveX Control Stack Based Buffer Overflow Vulnerability
BID:23941
Info
Hewlett Packard HPQVWOCX.DLL ActiveX Control Stack Based Buffer Overflow Vulnerability
| Bugtraq ID: | 23941 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-2656 |
| Remote: | Yes |
| Local: | No |
| Published: | May 11 2007 12:00AM |
| Updated: | May 07 2015 05:39PM |
| Credit: | The Goodfellas Security Research Team is credited with the discovery of this issue. |
| Vulnerable: |
HP hpqvwocx.dll 1.0 .309 |
| Not Vulnerable: | |
Discussion
Hewlett Packard HPQVWOCX.DLL ActiveX Control Stack Based Buffer Overflow Vulnerability
Hewlett Packard 'hpqvwocx.dll' ActiveX control library is prone to a stack-based buffer-overflow vulnerability because it fails to properly check boundaries on user-supplied data before copying it into an insufficiently sized memory buffer.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.
This issue affects 'hpqvwocx' 1.0.0.309; other versions may also be affected.
Hewlett Packard 'hpqvwocx.dll' ActiveX control library is prone to a stack-based buffer-overflow vulnerability because it fails to properly check boundaries on user-supplied data before copying it into an insufficiently sized memory buffer.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.
This issue affects 'hpqvwocx' 1.0.0.309; other versions may also be affected.
Exploit / POC
Hewlett Packard HPQVWOCX.DLL ActiveX Control Stack Based Buffer Overflow Vulnerability
To exploit this issue, an attacker must entice an unsuspecting user to open a maliciously crafted webpage.
The following proof-of-concept exploit is available:
To exploit this issue, an attacker must entice an unsuspecting user to open a maliciously crafted webpage.
The following proof-of-concept exploit is available:
Solution / Fix
Hewlett Packard HPQVWOCX.DLL ActiveX Control Stack Based Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Hewlett Packard HPQVWOCX.DLL ActiveX Control Stack Based Buffer Overflow Vulnerability
References:
References:
- HP Homepage (HP)
- Microsoft Knowledge Base Article 240797 (Microsoft)