1 results (0.006 seconds)

CVSS: 10.0EPSS: 14%CPEs: 1EXPL: 2

Heap-based buffer overflow in the KUpdateObj2 Class ActiveX control in UpdateOcx2.dll in Beijing KingSoft Antivirus Online Update Module 2007.12.29.29 allows remote attackers to execute arbitrary code via a long argument to the SetUninstallName method. Desbordamiento de búfer basado en montículo en el control KUpdateObj2 Class ActiveX de UpdateOcx2.dll en Beijing KingSoft Antivirus Online Update Module 2007.12.29.29 pemrite a atacantes remotos ejecutar código de su elección a través de un argumento largo a el método SetUninstallName. • https://www.exploit-db.com/exploits/5225 http://secunia.com/advisories/29204 http://www.securityfocus.com/bid/28172 http://www.vupen.com/english/advisories/2008/0857/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41088 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •