7.5
CVSSv2

CVE-2008-0220

Published: 10/01/2008 Updated: 29/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based buffer overflows in the WebLaunch.WeblaunchCtl.1 (aka CWebLaunchCtl) ActiveX control in weblaunch.ocx 1.0.0.1 in Gateway Weblaunch allow remote malicious users to execute arbitrary code via a long string in the (1) second or (2) fourth argument to the DoWebLaunch method. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

gateway cweblaunchctl activex control 1.0.0.1

gateway weblaunch

Exploits

<!-- Gateway Weblaunch ActiveX Control Insecure Method Exploit Implemented Categories: Category: Safe for Initialising Category: Safe for Scripting Written by eb Tested on Windows XP SP2(fully patched) English, IE6, weblaunchocx version 1001 This method is also vulnerable to a buffer overflow in the 2nd and 4th parameters --> <html& ...
<!-- Gateway WebLaunch Buffer Overflow Exploit written by eb Tested on Windows XP SP2(fully patched) English, IE6, Weblaunchocx: {93CEA8A4-6059-4E0B-ADDD-73848153DD5E} Weblaunch2ocx: {97BB6657-DC7F-4489-9067-51FAB9D8857E} Thanks to hdm and the Metasploit crew --> <html> <head> <title>Gateway WebLaunch Buffer O ...