APP: Step-by-Step Interactive Training Overflow 2
This signature detects attempts to exploit a known vulnerability in Step-by-Step Interactive Training, which does not handle bookmark link files correctly. Attackers can create a malicious bookmark link file, that, when accessed by a user to visit a listed Web site or opened as an attachment within an e-mail, enables the attacker to execute code and/or completely control a target host.
Extended Description
Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
Affected Products
Microsoft windows_98
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
7.5