CVE编号
CVE-2008-4771利用情况
暂无补丁情况
N/A披露时间
2008-10-29漏洞描述
Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://osvdb.org/42378 | |
http://osvdb.org/43007 | |
http://secunia.com/advisories/29131 | |
http://secunia.com/advisories/29145 | |
http://secunia.com/advisories/29146 | |
http://securityreason.com/securityalert/4517 | |
http://www.securityfocus.com/bid/28010 | |
http://www.vupen.com/english/advisories/2008/0685/references | |
http://www.vupen.com/english/advisories/2008/0686/references | |
http://www.vupen.com/english/advisories/2008/0687/references | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/40863 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/40864 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/40867 | |
https://www.exploit-db.com/exploits/5193 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | 4xem | vatctrl_class | 1.0.0.27 | - | |||||
运行在以下环境 | |||||||||
应用 | 4xem | vatctrl_class | 1.0.0.51 | - | |||||
运行在以下环境 | |||||||||
应用 | d-link | mpeg4_shm_audio_control | 1.7.0.5 | - | |||||
运行在以下环境 | |||||||||
应用 | vivotek | rtsp_mpeg4_sp_control | 2.0.0.39 | - |
- 攻击路径 网络
- 攻击复杂度 N/A
- 权限要求 无
- 影响范围 N/A
- 用户交互 需要
- 可用性 完全地
- 保密性 完全地
- 完整性 完全地
还没有评论,来说两句吧...