1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP LeadTools ISIS Control ActiveX BO

HTTP LeadTools ISIS Control ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects an attempt to overflow a buffer in the LeadTools ISIS ActiveX control by setting a parameter to a large value.

Additional Information

LeadTools ISIS Control is an SDK for imaging applications.

LeadTools ISIS Control ActiveX control is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

This issue occurs when an excessive amount of data is passed to the 'DriverName' method of the 'Ltisi14E.ocx' ActiveX control.

This issue resides in the ActiveX control with CLSID:00140050-B1BA-11CE-ABC6-F5B2E79D9E3F.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

LeadTools ISIS ActiveX control 14.5.0.44 is vulnerable to this issue; other versions may also be affected.

Affected

  • LeadTools ISIS Control 14.5.0.44

Response

Ensure that all patches provided by the vendor have been applied.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube