1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP LinkedIn Toolbar ActiveX BO

HTTP LinkedIn Toolbar ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in LinkedIn Browser Toolbar.

Additional Information

LinkedIn Browser Toolbar is an ActiveX control that acts as a browser plug-in to provide access to LinkedIn social network.

LinkedIn Browser Toolbar is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

This issue occurs when an excessive amount of data is passed to the search component.

This issue resides in the ActiveX control with the following CLSID:
{0F2437D6-C4E4-42CA-A906-F506E09354B7}.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

LinkedIn Browser Toolbar version 3.0.2.1098 is reported to be vulnerable. Other versions may be affected as well.

Affected

  • LinkedIn Browser Toolbar 3.0.2
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube