Artweaver is prone to a memory corruption when opening specially crafted AWD files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Artlantis Studio is prone to a vulnerability that may allow execution of mfc90loc.dll if this dll is located in the same folder than a .ATL file. The attacker must entice a victim into opening a specially crafted .ATL file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
Archive Searcher contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Archive Searcher when handling .ZIP files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .ZIP file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module runs a web server waiting for vulnerable clients (Apple Safari) to connect to it. When the client connects, it will try to install an agent by exploiting an invalid pointer reference in Apple Safari.
This module exploits an error in Apple Safari when handling parent windows, which allows the execution of arbitrary code when the user closes the popup windows. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Buffer Overflow when handling an attribute of "text3GTrack" elements can be exploited when Quick Player handles a specially crafted TeXML file
A vulnerability found in Apple QuickTime Player when handling a crafted TeXML file, it is possible to trigger a stack-based buffer overflow.
Buffer Overflow when handling an attribute of style elements can be exploited when Quick Player handles a specially crafted TeXML file
The vulnerability exists within the QuickTimeVR.qtx component when processing a QTVRStringAtom having an overly large "stringLength" parameter. This can be exploited to cause a based buffer overflow and execute arbitrary code under the context of the user running the application. This module runs a web server waiting for vulnerable clients (Internet Explorer 6, 7 or 8) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
The vulnerability exists within the way Quicktime handles the PnSize PICT opcode. It converts an unsigned 16 bit value into a signed 32 bit value, this is later used as the size parameter for a memory copy function that copies from the file onto the stack. The results in a stack based buffer overflow that allows for remote code execution under the context of the current user.
Pagination
- Previous page
- Page 182
- Next page