Buffer overflow in Internet Explorer daxctle.ocx

Causes a denial of service (crash) and can allow remote access

There's a heap-based buffer-overflow vulnerability within Internet Explorer 6. The flaw resides in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) and, when properly executed, allows remote attackers to execute arbitrary code. This is possible via unknown arguments added to the KeyFrame method, possibly related to an integer overflow. There is no patch at this time. A workaround is to disable Active Script in IE.

Additional resources:

Featured Video
6
This content is rated TV-MA, and is for viewers 18 years or older. Are you of age?
Sorry, you are not old enough to view this content.

Google unveils a new logo

A new Google logo steals attention away from another Google announcement.

by Iyaz Akhtar