#VU1315 Stack-based buffer overflow in GLWorld - CVE-2008-0647
Published: December 14, 2016 / Updated: March 21, 2017
Vulnerability identifier: #VU1315
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2008-0647
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
GLWorld
GLWorld
Software vendor:
Ourgame
Ourgame
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to stack-based buffer overflow in the ActiveX control (HanGamePluginCn18.dll). A remote attacker can create a specially crafted web page, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
The weakness exists due to stack-based buffer overflow in the ActiveX control (HanGamePluginCn18.dll). A remote attacker can create a specially crafted web page, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
Remediation
No remedy available.