First published: Fri Feb 08 2008(Updated: )
Multiple stack-based buffer overflows in Aurigma Image Uploader ActiveX control (ImageUploader4.ocx) 4.6.17.0, 4.5.70.0, and 4.5.126.0, and ImageUploader5 5.0.10.0, as used by Facebook PhotoUploader 4.5.57.0, allow remote attackers to execute arbitrary code via long (1) ExtractExif and (2) ExtractIptc properties.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Photochannel Pni Digital Media Upload Plugin Activex Control | =4.5.70.0 | |
Photochannel Pni Digital Media Upload Plugin Activex Control | =4.5.126.0 | |
Photochannel Pni Digital Media Upload Plugin Activex Control | =4.6.17.0 | |
Photochannel Pni Digital Media Upload Plugin Activex Control | =5.0.10.0 | |
Facebook PhotoUploader | =4.5.57.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0660 has a critical severity rating due to the potential for remote code execution.
To mitigate CVE-2008-0660, users should update to the latest version of Aurigma Image Uploader ActiveX control or disable ActiveX controls in their web browser.
CVE-2008-0660 affects Aurigma Image Uploader ActiveX control versions 4.5.70.0, 4.5.126.0, 4.6.17.0 and 5.0.10.0, as well as Facebook PhotoUploader version 4.5.57.0.
CVE-2008-0660 can be exploited through specially crafted calls to the ExtractExif and ExtractIp functions, leading to arbitrary code execution.
As a temporary workaround for CVE-2008-0660, users can limit the use of the Aurigma Image Uploader by avoiding untrusted uploads.