This module exploits a buffer overflow vulnerability in the Aladdin Knowledge System Ltd PrivAgent.ocx ActiveX Control. The exploit is triggered when the ChooseFilePath() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Advantech Webaccess suffers from an ActiveX buffer overflow. The specific flaw exists within the Connect method in webeye.ocx module.The control does not check the length of an attacker-supplied string in the Connect method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process. This module runs a web server waiting for vulnerable clients (Internet Explorer 6, 7, 8 to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Advantech Studio ISSymbol ActiveX control ISSymbol.ocx is vulnerable to a buffer overflow, caused by a long bstrFileName argument to the InternationalOrder method. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Advantage Data Architect is prone to a vulnerability that may allow the execution of any library file named wfapi.dll, if this dll is located in the same folder than a .ADT file. The attacker must entice a victim into opening a specially crafted .ADT file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.