Microsoft Visual Studio Masked Edit Control "Mask" Code Execution Vulnerability
RISK: Medium Risk
A vulnerability has been identified in Microsoft Visual Studio, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a buffer overflow error in the "Msmask32.ocx" ActiveX control when handling an overly long argument passed to the "Mask" parameter, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.
Impact
- Remote Code Execution
System / Technologies affected
- Microsoft Visual Studio 6.0 with Msmask32.ocx version 6.0.81.69 and prior
Solutions
It is not aware of any vendor-supplied patch.
Workaround:
Set a kill bit for the CLSID {C932BA85-4374-101B-A56C-00AA003668DC}.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with