Stack-based buffer overflow in the Ultra.OfficeControl ActiveX control in OfficeCtrl.ocx 2.0.2008.801 in Ultra Shareware Ultra Office Control allows remote attackers to execute arbitrary code via long strUrl, strFile, and strPostData parameters to the HttpUpload method.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.shinnai.net/xplits/TXT_RvfuIrwypWLMaiVn33Iy.html | exploit url repurposed |
https://www.exploit-db.com/exploits/6318 | exploit |
http://secunia.com/advisories/31632 | third party advisory vendor advisory |
http://securityreason.com/securityalert/4200 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44749 | vdb entry |
http://www.securityfocus.com/bid/30861 | vdb entry |
http://www.shinnai.net/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1219826651.ff.php | url repurposed |