Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote malicious users to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 2000 |
||
microsoft windows 2000 terminal services |
||
microsoft windows 2003 server enterprise |
||
microsoft windows 2003 server r2 |
||
microsoft windows 2003 server web |
||
microsoft windows 98 |
||
microsoft windows xp |
||
microsoft windows 2003 server 64-bit |
||
microsoft windows 2003 server enterprise_64-bit |
||
microsoft windows 2003 server standard |
||
microsoft windows 2003 server standard_64-bit |
||
microsoft windows me |
||
microsoft windows 2003 server datacenter_64-bit |
||
microsoft windows 98se |