| /// File Name: |
webex_ucf_newobject.rb.txt |
Description:
|
This Metasploit module exploits a stack-based buffer overflow in WebEx's WebexUCFObject ActiveX Control. If an long string is passed to the 'NewObject' method, a stack- based buffer overflow will occur when copying attacker-supplied data using the sprintf function. It is noteworthy that this vulnerability was discovered and reported by multiple independent researchers.
|
| Author: | Elazar Broad,Guido Landi,Tobias Klein |
| Homepage: | http://www.metasploit.com |
| File Size: | 4340 |
| Related OSVDB(s): | 47344 |
| Related CVE(s): | CVE-2008-3558 |
| Last Modified: | Mar 4 18:34:42 2010 |
| MD5 Checksum: | f2d99a88beab4e4dd35711d91502b078 |