---------------------------------------------------------------------- Secunia Survey Secunia would like to invite you to participate in an electronic survey evolving the usefulness of our mailing lists. To value your effort Secunia will offer you free access to the Secunia Security Manager for three months as well as have a prize draw for an iPod nano. We hope that you will give us a few minutes of your time, as your response will help us provide you with better services in the future. The questionnaire contains 19 questions and it takes approximately 5 minutes to answer the questionnaire. https://ca.secunia.com/survey/?survey_url=kei933wBid2 The survey is being conducted in accordance with the general Secunia Security Policy and your answers will of course be kept strictly confidential. Best regards, Niels Henrik Rasmussen CEO Secunia ---------------------------------------------------------------------- TITLE: Cryptomathic Cenroll ActiveX Control "createPKCS10()" Buffer Overflow SECUNIA ADVISORY ID: SA19968 VERIFY ADVISORY: http://secunia.com/advisories/19968/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Cryptomathic Cenroll ActiveX Control 1.x http://secunia.com/product/9770/ DESCRIPTION: Dennis Rand has reported a vulnerability in Cryptomathic Cenroll ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the "createPKCS10()" method. This can be exploited to cause a stack-based buffer overflow via an overly long string passed to the first argument of the method. The vulnerability has been reported in version 1.1.0.0. Other versions may also be affected. SOLUTION: Apply patch. https://opdatering.tdc.dk/ PROVIDED AND/OR DISCOVERED BY: Dennis Rand ORIGINAL ADVISORY: Cirt.dk: http://cirt.dk/advisories/cirt-43-advisory.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------