![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800530 |
Categoría: | Denial of Service |
Título: | SopCast SopCore ActiveX Control DoS Vulnerability - Windows |
Resumen: | SopCast SopCore ActiveX is prone to a denial of service (DoS) vulnerability. |
Descripción: | Summary: SopCast SopCore ActiveX is prone to a denial of service (DoS) vulnerability. Vulnerability Insight: Remote arbitrary programs can be executed via executable file name in the SetExternalPlayer function of the sopocx.ocx file and persuading a victim to visit a specially-crafted Web page. Vulnerability Impact: Attacker may exploit this issue to execute arbitrary script code and may crash the browser. Affected Software/OS: SopCast sopocx.ocx version 3.0.3.501 on Windows. Solution: Upgrade to SopCast version 3.2.9 or later. Workaround: Set the killbit for the CLSID {8FEFF364-6A5F-4966-A917-A3AC28411659} CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0811 BugTraq ID: 33920 http://www.securityfocus.com/bid/33920 Bugtraq: 20090226 Sopcast SopCore Control (sopocx.ocx 3.0.3.501) SetExternalPlayer() user assisted remote code execution poc (Google Search) http://www.securityfocus.com/archive/1/501252/100/0/threaded http://retrogod.altervista.org/9sg_sopcastia.html XForce ISS Database: sopcast-setexternalplayer-code-execution(48955) https://exchange.xforce.ibmcloud.com/vulnerabilities/48955 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |