Vulnerability Description
Stack-based buffer overflow in a certain ActiveX control in sasatl.dll 1.5.0.531 in Zenturi Program Checker (ProgramChecker) Pro allows remote attackers to execute arbitrary code via a long argument to the Fill method. NOTE: this is probably a different issue than CVE-2007-2987.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zenturi | Zenturi Programchecker | 1.5.531 |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0180.html
- http://osvdb.org/37707
- http://www.exploit-db.com/exploits/4170
- http://www.securityfocus.com/bid/24848Exploit
- http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0180.html
- http://osvdb.org/37707
- http://www.exploit-db.com/exploits/4170
- http://www.securityfocus.com/bid/24848Exploit
FAQ
What is CVE-2007-3703?
CVE-2007-3703 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Stack-based buffer overflow in a certain ActiveX control in sasatl.dll 1.5.0.531 in Zenturi Program Checker (ProgramChecker) Pro allows remote attackers to execute arbitrary code via a long argument t...
How severe is CVE-2007-3703?
CVE-2007-3703 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3703?
Check the references section above for vendor advisories and patch information. Affected products include: Zenturi Zenturi Programchecker.