{"vuid":"VU#481212","idnumber":"481212","name":"McAfee Subscription Manager ActiveX control vulnerable to stack buffer overflow","keywords":["McAfee","Subscription Manager","ActiveX control","stack buffer overflow","McSubMgr.dll","CLSID"],"overview":"The McAfee Subscription Manager ActiveX control contains a buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"ActiveX ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls. McAfee Security Center McAfee Security Center is a console for managing McAfee products and several aspects of a computer system's security. The problem McAfee Security Center provides a \"safe for scripting\" ActiveX control that contains a buffer overflow. The ActiveX object is called McSubMgr and is provided by the file mcsubmgr.dll.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebOC control) to crash.","resolution":"Upgrade or patch\nPlease see McAfee Security Bulletin 407052 for availability of updated versions of the affected software.","workarounds":"Disable ActiveX Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Instructions for disabling ActiveX in the Internet Zone can be found in the \"Securing Your Web Browser\" document and the Malicious Web Scripts FAQ. Note that disabling ActiveX controls in the Internet Zone will reduce the functionality of some web sites.","sysaffected":"","thanks":"This vulnerability was reported by eEye, who in turn credit Karl Lynn","author":"This document was written by Will Dormann.","public":["http://ts.mcafeehelp.com/faq3.asp?docid=407052","http://us.mcafee.com/root/product.asp?productid=msc","http://www.eeye.com/html/research/advisories/AD2006807.html","http://www.securityfocus.com/bid/19265","http://securitytracker.com/id?1016614","http://secunia.com/advisories/21264"],"cveids":["CVE-2006-3961"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-08-09T15:05:18Z","publicdate":"2006-08-07T00:00:00Z","datefirstpublished":"2006-08-15T18:44:44Z","dateupdated":"2006-10-03T13:52:45Z","revision":4,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"12","cam_impact":"13","cam_easeofexploitation":"15","cam_attackeraccessrequired":"18","cam_scorecurrent":"19.74375","cam_scorecurrentwidelyknown":"23.6925","cam_scorecurrentwidelyknownexploited":"39.4875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":19.74375,"vulnote":null}