Overview
The Particle Software IntraLaunch Application Launcher ActiveX control allows arbitrary code execution.
Description
Particle Software IntraLaunch is an ActiveX control that "... allows web page links to execute anything from applications to associations such as Word or Acrobat PDF documents both locally and across a network without prompts or security warnings." The IntraLaunch ActiveX control, which is provided by IntraLaunch.ocx, is marked Safe for Scripting and by default is not restricted to any specific domain or Internet Explorer zone. This means that any web site has the ability to run arbitrary code on a system that has the control. Note that a vendor may purchase a site-locked version of the IntraLaunch control, but by default the control is not restricted. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. |
Solution
We are currently unaware of a practical solution to this problem. Please consider the following workarounds: |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:-- |
Temporal | 0 | E:ND/RL:ND/RC:ND |
Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2009-0218 |
Severity Metric: | 9.62 |
Date Public: | 1997-06-07 |
Date First Published: | 2009-04-06 |
Date Last Updated: | 2016-08-12 15:24 UTC |
Document Revision: | 17 |