Zenturi ProgramChecker ActiveX Exploit

This module exploits a vulnerability in the sasatl.dll control included in the Zenturi ProgramChecker ActiveX application. The exploit is triggered when the DebugMsgLog() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2007-2987
Product Version: 
6.2
Released Date: 
Tuesday, July 17, 2007 - 00:00