Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   VeriSign Go Secure! Vendors:   VeriSign
VeriSign Go Secure! Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017693
SecurityTracker URL:
CVE Reference:   CVE-2007-1083   (Links to External Site)
Updated:  Feb 23 2007
Original Entry Date:  Feb 22 2007
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in VeriSign Go Secure! A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a stack overflow in the VerCompare() method of the ConfigChk ActiveX control (VSCnfChk.dll) and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Version of 'VSCnfChk.dll' is affected and prior versions may also be affected.

The CLSID of this control is 08F04139-8DFC-11D2-80E9-006008B066EE.

David D. Rude II of iDefense discovered this vulnerability.

The vendor was notified on December 22, 2006.

The original advisory is available at:

[Editor's note: iDefense is owned by VeriSign.]

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a patch.

The VeriSign advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC