1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP KSignSWAT ActiveX BO

HTTP KSignSWAT ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability by passing long arguments passed into a method of KSign KSignSWAT ActiveX control.

Additional Information

KSign KSignSWAT is a certification application for secure web transactions.

KSign KSignSWAT ActiveX control is prone to multiple buffer-overflow vulnerabilities because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

These issues occurs when an excessive amount of data is passed to the following methods of the 'AxKSignSWAT.dll' control with clsid:(F326007F-DD23-4724-BAFC-B1C97FC18794):

SWAT_Init()
SWAT_InitEx()
SWAT_InitEX2()
SWAT_InitEx3()
SWAT_Login()

Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

KSign KSignSWAT ActiveX control 2.0.3.3 is vulnerable; other versions may also be affected.

Affected

  • KSign KSignSWAT 2.0.3.3
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube