Lucene search

K
zdiDave Weinstein of HP's Zero Day InitaitiveZDI-15-069
HistoryFeb 27, 2015 - 12:00 a.m.

(0Day) WebGate eDVR Manager WESPMonitor.WESPMonitorCtrl.1 Connect Method Use-After-Free Remote Code Execution Vulnerability

2015-02-2700:00:00
Dave Weinstein of HP's Zero Day Initaitive
www.zerodayinitiative.com
11

0.228 Low

EPSS

Percentile

96.5%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of WebGate eDVR Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WESPMonitor.WESPMonitorCtrl.1 ActiveX control. By providing an invalid IP address to the Connect() method and forcing a page reload, an attacker can cause a pointer to be referenced after it has been freed. An attacker could use this to execute arbitrary code in the context of the browser.

0.228 Low

EPSS

Percentile

96.5%

Related for ZDI-15-069