SizerOne ActiveX Control AddTab Method Remote Buffer Overflow

High Nessus Plugin ID 35327


The remote Windows host has an ActiveX control that is affected by a buffer overflow vulnerability.


The SizerOne ActiveX control is installed on the remote system. It is included with ComponentOne Studio Enterprise as well as other applications such as TSC2 Help Desk and SAP GUI.

The installed version of the control is affected by a heap-based buffer overflow vulnerability that can be triggered by adding tabs with very long captions via the control's 'AddTab()' method. If a remote attacker can trick a user on the affected host into viewing a specially crafted HTML document, this issue could be leveraged to execute arbitrary code on the affected host subject to the user's privileges.


Update to version 8.0.20081.142 of c1sizer.ocx or 7.10 PL of sizerone.ocx.

See Also

Plugin Details

Severity: High

ID: 35327

File Name: sizerone_addtab_activex_overflow.nasl

Version: $Revision: 1.12 $

Type: local

Agent: windows

Family: Windows

Published: 2009/01/09

Modified: 2016/12/14

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-4827

BID: 33148

OSVDB: 51179, 51184

Secunia: 32609, 32648, 32672

CWE: 119