Multiple stack-based buffer overflows in the Learn2 Corporation STRunner (aka Street Technologies) ActiveX control in iestm32.dll allow remote attackers to execute arbitrary code via unspecified vectors. Additional information can be obtained from: http://www.securityfocus.com/bid/28058/info
Instructions on disabling Active X in internet explorer is located here:
http://support.microsoft.com/kb/240797
Publication date: Tue, 04 Mar 2008 00:44:00 +0000