CVE-2013-7246

N/A Unknown
Published: January 30, 2014 Modified: April 29, 2026
View on NVD

Description

Buffer overflow in the IconCreate method in an ActiveX control in the DaumGame ActiveX plugin 1.1.0.4 and 1.1.0.5 allows remote attackers to execute arbitrary code via a long string, as exploited in the wild in January 2014.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://packetstormsecurity.com/files/124886
Source: cve@mitre.org
Exploit
http://www.exploit-db.com/exploits/31179
Source: cve@mitre.org
Exploit
http://blog.spiderlabs.com/2014/01/daumgame-activex-0day.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://packetstormsecurity.com/files/124886
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://seclists.org/fulldisclosure/2014/Jan/132
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.exploit-db.com/exploits/31179
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/90588
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.trustwave.com/spiderlabs/advisories/TWSL2014-002.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
33.7%
97th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

daum_communications