/// File Name: |
webex_ucf_newobject.rb.txt |
Description:
|
This Metasploit module exploits a stack-based buffer overflow in WebEx's WebexUCFObject ActiveX Control. If an long string is passed to the 'NewObject' method, a stack- based buffer overflow will occur when copying attacker-supplied data using the sprintf function. It is noteworthy that this vulnerability was discovered and reported by multiple independent researchers.
|
Author: | Elazar Broad,Guido Landi,Tobias Klein |
Homepage: | http://www.metasploit.com |
File Size: | 4340 |
Related OSVDB(s): | 47344 |
Related CVE(s): | CVE-2008-3558 |
Last Modified: | Mar 4 18:34:42 2010 |
MD5 Checksum: | f2d99a88beab4e4dd35711d91502b078 |