Vulnerability Details : CVE-2012-0267
Public exploit exists!
The StopModule method in the NTR ActiveX control before 2.0.4.8 allows remote attackers to execute arbitrary code via a crafted lModule parameter that triggers use of an arbitrary memory address as a function pointer.
Vulnerability category: Input validationExecute code
Products affected by CVE-2012-0267
- cpe:2.3:a:ntrglobal:ntr_activex_control:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-0267
93.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-0267
-
NTR ActiveX Control StopModule() Remote Code Execution
Disclosure Date: 2012-01-11First seen: 2020-04-26exploit/windows/browser/ntr_activex_stopmoduleThis module exploits a vulnerability found in the NTR ActiveX 1.1.8. The vulnerability exists in the StopModule() method, where the lModule parameter is used to dereference memory to get a function pointer, which leads to code execution under the context of the use
CVSS scores for CVE-2012-0267
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-0267
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0267
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/72295
NTR ActiveX control StopModule() code execution CVE-2012-0267 Vulnerability Report
-
http://www.exploit-db.com/exploits/21839
NTR - ActiveX Control 'StopModule()' Remote Code Execution (Metasploit) - Windows remote Exploit
Jump to