1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP HP Mercury QC ActiveX BO

HTTP HP Mercury QC ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempt to exploit buffer overflow vulnerability by passing long arguments to parameters of the Spider90.ocx ActiveX control.

Additional Information

HP Mercury Quality Center is a web-based system for automated software QA.

HP Mercury Quality Center ActiveX control is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Attackers may exploit this issue by enticing victims into opening malicious HTML content that instantiates the affected control.

Exploiting this issue allows remote attackers to execute arbitrary code in the context of applications using the affected ActiveX control and possibly to compromise affected computers.

HP Mercury Quality Center versions 8.2 SP1 and 9.0 are vulnerable to this issue.


  • HP Mercury Quality Center 8.2, 9.0


The vendor released updates to address this issue. Please see the references for more information.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube