Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
![App screenshot](https://www.mageni.net/assets/img/screenshot.png)
Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
Information
Severity
Severity
Critical
Family
Family
Buffer overflow
CVSSv2 Base
CVSSv2 Base
9.3
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
15 years ago
Modified
Modified
5 years ago
Summary
This host is installed with Microsoft Video ActiveX Control and is prone to Buffer Overflow vulnerability.
Insight
Insight
- Stack-based buffer overflow error in MPEG2TuneRequest in msvidctl.dll in Microsoft DirectShow can be exploited via a crafted web page. - Unspecified error in msvidctl.dll is caused via unknown vectors that trigger memory corruption.
Affected Software
Affected Software
Microsoft Video ActiveX Control on Windows 2000/XP/2003
Solution
Solution
The vendor has released updates. Please see the references for more information. Workaround: Set the killbit for the CLSID {0955AC62-BF2E-4CBA-A2B9-A63F772D46CF}