Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.800530
Category:Denial of Service
Title:SopCast SopCore ActiveX Control DoS Vulnerability - Windows
Summary:SopCast SopCore ActiveX is prone to a denial of service (DoS) vulnerability.
Description:Summary:
SopCast SopCore ActiveX is prone to a denial of service (DoS) vulnerability.

Vulnerability Insight:
Remote arbitrary programs can be executed via executable file name in the
SetExternalPlayer function of the sopocx.ocx file and persuading a victim
to visit a specially-crafted Web page.

Vulnerability Impact:
Attacker may exploit this issue to execute arbitrary script code and may
crash the browser.

Affected Software/OS:
SopCast sopocx.ocx version 3.0.3.501 on Windows.

Solution:
Upgrade to SopCast version 3.2.9 or later.

Workaround:
Set the killbit for the CLSID {8FEFF364-6A5F-4966-A917-A3AC28411659}

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-0811
BugTraq ID: 33920
http://www.securityfocus.com/bid/33920
Bugtraq: 20090226 Sopcast SopCore Control (sopocx.ocx 3.0.3.501) SetExternalPlayer() user assisted remote code execution poc (Google Search)
http://www.securityfocus.com/archive/1/501252/100/0/threaded
http://retrogod.altervista.org/9sg_sopcastia.html
XForce ISS Database: sopcast-setexternalplayer-code-execution(48955)
https://exchange.xforce.ibmcloud.com/vulnerabilities/48955
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.