|CVSS SCORE||7.5, (AV:N/AC:L/Au:N/C:P/I:P/A:P)|
|TIPPINGPOINT™ IPS CUSTOMER PROTECTION||TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 16733. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The specific flaw exists within the MetaDraw ActiveX control's ObjectOverlappedBy method. The control dereferences an attacker-supplied memory address and redirects execution flow to the resulting address. An attacker can exploit this condition to achieve code execution under the context of the browser process.
Schneider Electric has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||Andrea Micalizzi (rgod)