HTTP: Step-by-Step Interactive Training Buffer Overflow
This signature detects attempts to exploit a known vulnerability against Step-By-Step Interactive Training. An attacker can create malicious Web pages containing dangerous CBO files with a long Syllabus reference, which if visited, can gain control of a victim's system.
Extended Description
Microsoft Step-by-Step Interactive Training is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker could exploit this issue by enticing a victim to load a bookmark link file. If the vulnerability is successfully exploited, this could result in the execution of arbitrary code in the context of the currently logged-in user.
Affected Products
Microsoft step-by-step_interactive_training
References
BugTraq: 22484
CVE: CVE-2006-3448
URL: http://www.security-assessment.com/files/advisories/ms_interactive_training_.cbo_overflow_2.pdf
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
9.3