Buffer overflow in Internet Explorer daxctle.ocx

Causes a denial of service (crash) and can allow remote access

There's a heap-based buffer-overflow vulnerability within Internet Explorer 6. The flaw resides in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) and, when properly executed, allows remote attackers to execute arbitrary code. This is possible via unknown arguments added to the KeyFrame method, possibly related to an integer overflow. There is no patch at this time. A workaround is to disable Active Script in IE.

Additional resources:

Tags:
Mobile
About the author

    As CNET's former resident security expert, Robert Vamosi has been interviewed on the BBC, CNN, MSNBC, and other outlets to share his knowledge about the latest online threats and to offer advice on personal and corporate security.

     

    Join the discussion

    Conversation powered by Livefyre

    Don't Miss
    Hot Products
    Trending on CNET

    HOT ON CNET

    Up for a challenge?

    Put yourself to the real tech test by building your own virtual-reality headset with a few household items.