This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects an attempt to execute remote code by passing data into a method of the Lenovo Inline Automated Solutions ActiveX control.
Lenovo Inline Automated Solutions ActiveX controls are prone to multiple vulnerabilities. These issues occurs in the ActiveX controls with CLISDs:
The following specific issues were reported in the 'acpRunner' control:
- A remote format-string vulnerability that may allow remote attackers to execute arbitrary code.
- The control allows arbitrary sites to access methods, which may result in a variety of attacks.
- The control doesn't verify signatures of downloaded packages, which could result in the execution of arbitrary malicious code.
An attacker may exploit these issues by enticing victims into opening a maliciously crafted HTML document.
Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts may result in denial-of-service conditions.
These issues affects versions prior to 'acpcontroller.dll' ActiveX control 220.127.116.11 and 'acpir.dll' ActiveX control 18.104.22.168.
- Lenovo Inline Automated Solutions fix pack 1
The vendor released updates to address these issues. Please see the references for more information.