Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2010-0679 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Stack Buffer Overflow in Hyleos ChemView ActiveX. πŸ’₯ **Consequences**: Remote attackers can execute arbitrary code via malformed file declarations with extra whitespace.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Stack-based buffer overflow. ⚠️ **Flaw**: Improper handling of multiple blank characters in `SaveasMolFile` and `ReadMolFile` declarations.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: Hyleos ChemView. πŸ“… **Version**: Specifically v1.9.5.1. πŸ–₯️ **Component**: The ActiveX control embedded in browsers.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Arbitrary Code Execution. πŸ“‚ **Data**: Full system compromise possible. The attacker gains the same rights as the user running the browser.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: Low. 🌐 **Auth**: None required. It is a **Remote** vulnerability. Victims just need to visit a malicious page or open a crafted file.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exp?**: YES. πŸ“‚ **Sources**: Exploit-DB (ID 11422) and Packet Storm Security have public PoCs. Wild exploitation is feasible.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Hyleos ChemView ActiveX control. πŸ“‹ **Indicator**: Look for version 1.9.5.1 in browser plugins or installed software lists.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update to a patched version if available. 🚫 **Status**: The vendor is listed as 'n/a' in data, so check official Hyleos channels for specific patches.

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch?**: Disable ActiveX controls. 🚫 **Mitigation**: Block the specific ActiveX class ID or use a browser with strict ActiveX restrictions.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. πŸ“‰ **Priority**: Critical. Remote Code Execution (RCE) with public exploits means immediate patching or isolation is required.