Skip to main content

Microsoft Visual Studio Masked Edit Control "Mask" Code Execution Vulnerability

Last Update Date: 28 Jan 2011 Release Date: 15 Aug 2008 5582 Views

RISK: Medium Risk

A vulnerability has been identified in Microsoft Visual Studio, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a buffer overflow error in the "Msmask32.ocx" ActiveX control when handling an overly long argument passed to the "Mask" parameter, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.


Impact

  • Remote Code Execution

System / Technologies affected

  • Microsoft Visual Studio 6.0 with Msmask32.ocx version 6.0.81.69 and prior

Solutions

It is not aware of any vendor-supplied patch.

Workaround:
Set a kill bit for the CLSID {C932BA85-4374-101B-A56C-00AA003668DC}.


Vulnerability Identifier

  • No CVE information is available

Source


Related Link