CVE-2008-4771
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
28/10/2008
Last modified:
09/04/2025
Description
Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:4xem:vatctrl_class:1.0.0.27:*:*:*:*:*:*:* | ||
| cpe:2.3:a:4xem:vatctrl_class:1.0.0.51:*:*:*:*:*:*:* | ||
| cpe:2.3:a:d-link:mpeg4_shm_audio_control:1.7.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vivotek:rtsp_mpeg4_sp_control:2.0.0.39:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/42378
- http://osvdb.org/43007
- http://secunia.com/advisories/29131
- http://secunia.com/advisories/29145
- http://secunia.com/advisories/29146
- http://securityreason.com/securityalert/4517
- http://www.securityfocus.com/bid/28010
- http://www.vupen.com/english/advisories/2008/0685/references
- http://www.vupen.com/english/advisories/2008/0686/references
- http://www.vupen.com/english/advisories/2008/0687/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40863
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40864
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40867
- https://www.exploit-db.com/exploits/5193
- http://osvdb.org/42378
- http://osvdb.org/43007
- http://secunia.com/advisories/29131
- http://secunia.com/advisories/29145
- http://secunia.com/advisories/29146
- http://securityreason.com/securityalert/4517
- http://www.securityfocus.com/bid/28010
- http://www.vupen.com/english/advisories/2008/0685/references
- http://www.vupen.com/english/advisories/2008/0686/references
- http://www.vupen.com/english/advisories/2008/0687/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40863
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40864
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40867
- https://www.exploit-db.com/exploits/5193



