New Search

Step-by-Step Interactive Training Buffer Overflow

oval:org.mitre.oval:def:1224

Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo cbl or .cbm extension) with a long User field.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows ME
  • Microsoft Windows 98
  • Microsoft Windows 2000
  • Microsoft Windows XP
  • Microsoft Windows Server 2003
Class:
vulnerability
Reference(s):
  • CVE-2005-1212
Product(s):
  • Microsoft Interactive Training