VeriSign I-Nav VUpdater.Install ActiveX control code execution
|verisign-inav-activex-code-execution (26375)||High Risk|
The VeriSign i-Nav ActiveX control (VUpdater.Install), which is used by Microsoft Internet Explorer, Outlook and Outlook Express, could allow a remote attacker to execute arbitrary code on the system, caused by improper verification of Microsoft .CAB files. An attacker could exploit this vulnerability by persuading a potential victim to visit a malicious Web page or opening a specially-crafted HTML email.
Upgrade to the latest version of the I-Nav ActiveX control, available from Idnnow.com. See References.
- idnnow.com: Web Addresses in Your Language.
- ZDI-06-014: Verisign I-Nav ActiveX Control Code Execution Vulnerability.
- BID-17939: Verisign i-Nav ActiveX Control Remote Buffer Overflow Vulnerability
- CVE-2006-2273: The InstallProduct routine in the Verisign VUpdater.Install (aka i-Nav) ActiveX control does not verify Microsoft Cabinet (.CAB) files, which allows remote attackers to run an arbitrary executable file.
- OSVDB ID: 25431: VeriSign i-NAV VUpdater.Install ActiveX Arbitrary Code Execution
- SA20074: Verisign i-NAV ActiveX Control Arbitrary Code Execution
- SECTRACK ID: 1016059: VeriSign i-Nav ActiveX Plugin CAB Validation Flaw Lets Remote Users Execute Arbitrary Code
- VeriSign I-Nav ActiveX control
May 10, 2006
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this