Haikz has reported a vulnerability in Cellosoft Tokens Object extension for Vitalize!, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error within the Tokens Object (nptoken.mox) extension when handling the "RemoveChr()" method. This can be exploited to cause a stack-based buffer overflow via an overly long (greater than 1024 bytes) string passed as argument to the affected method.
Successful exploitation allows execution of arbitrary code when a user visits a malicious website but requires that the Vitalize! browser plug-in is installed.
The vulnerability is reported in version 220.127.116.11. Other versions may also be affected.
Solution: The Cellosoft Tokens Object will reportedly be removed from Vitalize.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org