Subject: [NT] Additional details on the System Monitor ActiveX buffer overflow
Date: Mon, 6 Nov 2000 07:48:59 +0100
Additional details on the System Monitor ActiveX buffer overflow
------------------------------------------------------------------------
SUMMARY
The USSR Team has found a vulnerability in the Microsoft System Monitor
ActiveX control (class id: C4D2D8E0-D1DD-11CE-940F-008029004347,
sysmon.ocx). The Value field name "LogFileName" could be used by a
malicious web server operator to potentially run code on a visiting user's
machine.
The vulnerability can only be exploited if ActiveX controls are enabled in
Internet Explorer, Outlook or Outlook Express.
DETAILS
Vulnerable systems:
Microsoft Windows 2000 Server
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Example exploit page: