Description: | | There exists a file overwriting vulnerability in Microsoft Rich Textbox Control ActiveX control. The flaw is due to lack of path verification in the control's method SaveFile. A remote attacker may exploit this vulnerability via a specially crafted web page to create or modify arbitrary files on the target system. After successfully exploiting this vulnerability, a file on the target file system might be created, or overwritten. An attacker may write a file to the start up folder in order to execute arbitrary code during the next reboot or logon session or overwrite credential files on the system in order to gain access to the system. Thus, the behaviour of the target depends on the intention of the attacker. |