Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability

Information

Severity

Severity

Critical

Family

Family

Buffer overflow

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

3 years ago

Summary

This host is installed with Microsoft Video ActiveX Control and is prone to Buffer Overflow vulnerability.

Insight

Insight

- Stack-based buffer overflow error in MPEG2TuneRequest in msvidctl.dll in Microsoft DirectShow can be exploited via a crafted web page. - Unspecified error in msvidctl.dll is caused via unknown vectors that trigger memory corruption.

Affected Software

Affected Software

Microsoft Video ActiveX Control on Windows 2000/XP/2003

Solution

Solution

The vendor has released updates. Please see the references for more information. Workaround: Set the killbit for the CLSID {0955AC62-BF2E-4CBA-A2B9-A63F772D46CF}

Common Vulnerabilities and Exposures (CVE)