Buffer overflow in Troubleshooter ActiveX Control (Tshoot.ocx) in Microsoft Windows 2000 SP4 and earlier allows remote attackers to execute arbitrary code via an HTML document with a long argument to the RunQuery2 method.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.cert.org/advisories/CA-2003-27.html | third party advisory us government resource |
http://marc.info/?l=ntbugtraq&m=106632192709608&w=2 | mailing list |
http://archives.neohapsis.com/archives/vulnwatch/2003-q4/0015.html | mailing list exploit patch vendor advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-042 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A237 | vdb entry signature |
https://exchange.xforce.ibmcloud.com/vulnerabilities/13423 | vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012205.html | mailing list |
http://www.securityfocus.com/bid/8833 | exploit vdb entry patch vendor advisory |
http://www.kb.cert.org/vuls/id/989932 | us government resource third party advisory patch |