ID CVE-2007-3703
Summary Stack-based buffer overflow in a certain ActiveX control in sasatl.dll 1.5.0.531 in Zenturi Program Checker (ProgramChecker) Pro allows remote attackers to execute arbitrary code via a long argument to the Fill method. NOTE: this is probably a different issue than CVE-2007-2987.
References
Vulnerable Configurations
  • cpe:2.3:a:zenturi:zenturi_programchecker:1.5.531:*:*:*:*:*:*:*
    cpe:2.3:a:zenturi:zenturi_programchecker:1.5.531:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 29-09-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 24848
exploit-db 4170
fulldisc 20070710 [GOODFELLAS - VULN] sasatl.dll 1.5.0.531 Program Checker - Javascript Heap Spraying Exploit
osvdb 37707
Last major update 29-09-2017 - 01:29
Published 11-07-2007 - 23:30
Last modified 29-09-2017 - 01:29
Back to Top