SAP Crystal Reports Print ActiveX Control Buffer Overflow Vulnerability

Summary
This host is installed with SAP Crystal Reports and is prone to heap-based buffer overflow vulnerability.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code in the context of the application using the ActiveX control. Failed exploit attempts will likely result in denial-of-service condition. Impact Level: Application.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. A workaround is to set the kill-bit to stop ActiveX Control. http://support.microsoft.com/kb/240797
Insight
The flaw exists due to boundary error in the 'CrystalReports12.CrystalPrintControl.1' ActiveX control (PrintControl.dll) when processing 'ServerResourceVersion' which can be exploited to cause a heap-based buffer overflow via an overly long string.
Affected
Crystal Reports 2008 SP3 Fix Pack 3.2(12.3.2.753)
References