Buffer Overflow Vulnerability in Microsoft Step-by-Step Interactive Training
CVE-2005-1212
Currently unrated
Key Information:
- Vendor
- Microsoft
- Vendor
- CVE Published:
- 14 June 2005
Summary
A buffer overflow vulnerability in Microsoft Step-by-Step Interactive Training (onrun32.exe) exposes the application to remote code execution attacks. When a user opens a bookmark link file with an excessively long User field, it may cause the application to overwrite memory space, allowing an attacker to execute arbitrary code on the user’s system. This vulnerability highlights the importance of securing software applications against such buffer overflow exploits, particularly when processing user inputs from potentially unsafe sources.
References
EPSS Score
44% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved