1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Dart Zip ActiveX BO

HTTP Dart Zip ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability by passing long arguments passed into a method of Dart Zip Compression ActiveX control.

Additional Information

The Dart Zip Compression for ActiveX is a file compression/decompression utility for Microsoft Windows.

The application is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

This issue occurs when an excessive amount of data is passed through the first parameter of the 'QuickZip' method of the 'DartZip.dll' ActiveX control.

This issue resides in the ActiveX control with CLSID:42BA826E-F8D8-4D8D-8C05-14ABCE99D4DD.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

Dart Zip Compression for ActiveX 1.8.5.3 is vulnerable to this issue; other versions may also be affected.

NOTE: Due to code reuse, this issue is similar or possibly identical to the one described in BID 24099 (Dart ZipLite Compression DartZipLite.DLL ActiveX Control Buffer Overflow Vulnerability). This has not been confirmed.

Affected

  • Dart Zip Compression for ActiveX 1.8.5.3

Response

Download and install all vendor patches related to this vulnerability.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube