Multiple buffer overflows in the Provideo ActiveX controls allow remote attackers to execute arbitrary code via crafted input fields, as demonstrated by (1) a long strIp argument to the voice method in 2way.dll in the alarm 1.0.3.1 ActiveX control, (2) a network response to AXPlayer.ocx in the GMAXPlayer 2.0.8.2 ActiveX control, the (3) UserName or (4) Password parameter to AXPlayer.ocx in the GMAXPlayer 2.0.8.2 ActiveX control, (5) a long Id parameter to the GetString method in PAxPlayer.ocx in the PAxPlayer 3.0.0.9 ActiveX control, or (6) a long strAdr parameter to the ConnectIPCam method in PAxPlayer.ocx in the PAxPlayer 3.0.0.9 ActiveX control.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://secunia.com/secunia_research/2011-56/ | vendor advisory |
http://osvdb.org/74314 | vdb entry |
http://secunia.com/secunia_research/2011-57/ | vendor advisory |
http://osvdb.org/74313 | vdb entry |
http://www.securityfocus.com/bid/48977 | vdb entry |
http://osvdb.org/74311 | vdb entry |
http://secunia.com/secunia_research/2011-58/ | vendor advisory |
http://osvdb.org/74310 | vdb entry |
http://osvdb.org/74312 | vdb entry |