First published: Tue Oct 28 2008(Updated: )
Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
4xem Vatctrl Class | =1.0.0.51 | |
D-link Mpeg4 Shm Audio Control | =1.7.0.5 | |
4xem Vatctrl Class | =1.0.0.27 | |
Vivotek Rtsp Mpeg4 Sp Control | =2.0.0.39 | |
4xem VatCtrl Class | =1.0.0.27 | |
4xem VatCtrl Class | =1.0.0.51 | |
D-Link MPEG4 SHM Audio Control | =1.7.0.5 | |
Vivotek RTSP MPEG4 SP Control | =2.0.0.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-4771 is typically high due to its potential for stack-based buffer overflow exploitation.
To fix CVE-2008-4771, you should update the affected ActiveX controls to their latest versions as released by the respective vendors.
CVE-2008-4771 affects the 4xem VatCtrl Class versions 1.0.0.27 and 1.0.0.51, D-Link MPEG4 SHM Audio Control version 1.7.0.5, and Vivotek RTSP MPEG4 SP Control version 2.0.0.39.
The impact of CVE-2008-4771 can lead to a full system compromise if an attacker successfully exploits the buffer overflow vulnerability.
While CVE-2008-4771 was identified in 2008, systems still using the affected software versions remain vulnerable and should be addressed.