Description
Buffer overflow in BankTown Client Control (aka BtCxCtl20Com) 1.4.2.51817, and possibly 1.5.2.50209, allows remote attackers to execute arbitrary code via a long string in the first argument to SetBannerUrl. NOTE: portions of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Gyu Tae · textremotewindows
https://www.exploit-db.com/exploits/27806
References (9)
Core 9
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19942
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/855
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17815
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1638
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/432862/100/0/threaded
Exploit mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0037.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/433242/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/25212
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26214
Scores
EPSS
0.2092
EPSS Percentile
95.7%
Details
Status
published
Products (2)
banktown/btcxctl20com_activex_control
1.4.2.51817
banktown/btcxctl20com_activex_control
1.5.2.50209
Published
May 05, 2006
Tracked Since
Feb 18, 2026