1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP eSellerate ActiveX BO

HTTP eSellerate ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability by passing long arguments passed into a method of eSellerate SDK ActiveX control.

Additional Information

eSellerate provides ecommerce tools for software publishers. The eSellerate SDK allows software makers to embed eSellerate functionality in applications; it includes an ActiveX control.

The application is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

This issue occurs when excessive data is passed through the first argument to the 'GetWebStoreURL' method of the 'eSellerateControl365.dll' library.

This issue resides in the ActiveX control with CLSID: 'C915F573-4C11-4968-9080-29E611FDBE9F'.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

This issue affects eSellerate SDK 3.6.5.0; other versions may also be affected.

Affected

  • Digital River eSellerate SDK 3.6.5.0
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube