Lucene search

K
zdiAnonymousZDI-06-014
HistoryMay 10, 2006 - 12:00 a.m.

Verisign I-Nav ActiveX Control Code Execution Vulnerability

2006-05-1000:00:00
Anonymous
www.zerodayinitiative.com
15

EPSS

0.043

Percentile

92.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Verisign i-Nav ActiveX control. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. The specific flaw exists within the “VUpdater.Install” ActiveX control which is used to provide native support for Internationalized Domain Names (IDNs) in Microsoft Internet Explorer, Microsoft Outlook and Microsoft Outlook Express. Due to the lack of verification on Microsoft Cabinet (.CAB) files from the “InstallProduct” routine, an attacker can specify an arbitrary executable to run under the context of the current user.

References

EPSS

0.043

Percentile

92.3%