Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Microsoft Step-By-Step Interactive Training书签链接溢出漏洞
Vulnerability Description
Microsoft Windows是微软发布的非常流行的操作系统,Step-by-Step Interactive Training是其中的一个组件。 Microsoft Step-By-Step Interactive Training中存在缓冲区溢出漏洞,起因是书签链接文件中验证数据时的边界条件错误。具体的说,在处理畸形.cbo文件时会出现这个漏洞。典型的.cbo文件内容如下: [Microsoft Interactive Training] User=DEFAULT SerialID=0000000
CVSS Information
N/A
Vulnerability Type
N/A