1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP ACTi Video Controller ActiveX File Overwrite

HTTP ACTi Video Controller ActiveX File Overwrite

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempt to exploit a File Overwrite Vulnerability by using a method of ACTi Network Video Controller ActiveX control.

Additional Information

Network Video Controller is an application that allows users to monitor their security camera system.

Network Video Controller is prone to multiple remote vulnerabilities. These issues include:

- A buffer-overflow vulnerability. This issue occurs because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. This issue occurs in the 'SetText()' method of the 'nvUnifiedControl.dll' ActiveX control with CLSID:A6F36F3F-3AE0-458B-AFC4-AA82565E0BF8.

- An arbitrary file-overwrite vulnerability. This issue is due to the unauthorized use of the 'SaveXMLFile()' when saving files. The vulnerability resides in the 'nvUtility.dll' ActiveX control with CLSID:A0D43FB0-116B-47AB-80FB-6DCFA92A03E3.

- An arbitrary file-deletion vulnerability. The issue is due to the unauthorized use of 'DeleteXMLFile()' method when deleting files. The vulnerability resides in the ''nvUtility.dll' ActiveX Control with CLSID: A0D43FB0-116B-47AB-80FB-6DCFA92A03E3.

Exploiting these issues allows remote attackers to execute arbitrary code, overwrite and delete arbitrary files in the context of applications using the affected ActiveX control (typically Internet Explorer).

These issues affect Network Video Controller 2.0 SP2; other versions may also be affected.

Affected

  • ACTi Network Video Controller 2.0 SP2
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube