Interactual Technologies InterActual Player up to 2.5 ActiveX Control iarecord.dll stack-based overflow
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.9 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Interactual Technologies InterActual Player up to 2.5. It has been classified as critical. This affects an unknown part in the library iarecord.dll of the component ActiveX Control. This manipulation causes stack-based overflow. This vulnerability is handled as CVE-2006-3925. There is not any exploit available. Upgrading the affected component is recommended.
Details
A vulnerability was found in Interactual Technologies InterActual Player up to 2.5. It has been declared as critical. Affected by this vulnerability is an unknown code block in the library iarecord.dll of the component ActiveX Control. The manipulation with an unknown input leads to a stack-based overflow vulnerability. The CWE definition for the vulnerability is CWE-121. A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). As an impact it is known to affect confidentiality, and integrity. The summary by CVE is:
Stack-based buffer overflow in ITIRecorder.MicRecorder ActiveX control in iarecord.dll in InterActual Player before 2.6 allows remote attackers to execute arbitrary code via a long argument to the Files method. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
The bug was discovered 07/28/2006. The weakness was released 07/28/2006 by Parvez Anwar (Website). The advisory is shared at secunia.com. This vulnerability is known as CVE-2006-3925 since 07/28/2006. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details are known, but no exploit is available.
It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 22160 (CA eTrust Antivirus WebScan ActiveX Control Vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows and running in the context l.
Upgrading to version 2.6 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (28055), Tenable (22160), SecurityFocus (BID 19205†), OSVDB (27594†) and Secunia (SA20845†). Entries connected to this vulnerability are available at VDB-31635, VDB-31634 and VDB-31633. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.9
VulDB Base Score: 6.5
VulDB Temp Score: 5.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Stack-based overflowCWE: CWE-121 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 22160
Nessus Name: CA eTrust Antivirus WebScan ActiveX Control Vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: InterActual Player 2.6
Timeline
07/28/2006 🔍07/28/2006 🔍
07/28/2006 🔍
07/28/2006 🔍
07/28/2006 🔍
07/28/2006 🔍
07/28/2006 🔍
08/04/2006 🔍
08/07/2006 🔍
03/12/2015 🔍
07/13/2021 🔍
Sources
Advisory: secunia.com⛔Researcher: Parvez Anwar
Status: Not defined
CVE: CVE-2006-3925 (🔍)
GCVE (CVE): GCVE-0-2006-3925
GCVE (VulDB): GCVE-100-31561
X-Force: 28055
SecurityFocus: 19205 - InterActual Player ITIRecorder.MicRecorder ActiveX Control Remote Buffer Overflow Vulnerability
Secunia: 20845 - InterActual Player ActiveX Control Buffer Overflow, Highly Critical
OSVDB: 27594 - InterActual Player - ITIRecorder.MicRecorder ActiveX Control - Remote Buffer Overflow Issue
Vulnerability Center: 12468 - InterActual Player Buffer Overflow in ITIRecorder.MicRecorder ActiveX Control in iarecord.dll, Medium
Vupen: ADV-2006-3016
See also: 🔍
Entry
Created: 03/12/2015 14:25Updated: 07/13/2021 07:16
Changes: 03/12/2015 14:25 (70), 06/24/2019 09:25 (6), 07/13/2021 07:16 (3)
Complete: 🔍
Cache ID: 216:5C4:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.