New Search

ActiveX Object Memory Corruption Vulnerability

oval:org.mitre.oval:def:5481

Stack-based buffer overflow in certain ActiveX controls in (1) FPOLE.OCX 6.0.8450.0 and (2) Foxtlib.ocx as used in the Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library; and Internet Explorer 5.01 6 SP1 and SP2 and 7; allows remote attackers to execute arbitrary code via a long first argument to the FoxDoCmd function.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows 2000
  • Microsoft Windows Vista
  • Microsoft Windows Server 2003
  • Microsoft Windows XP
Class:
vulnerability
Reference(s):
  • CVE-2007-4790
Product(s):
  • Microsoft Internet Explorer