1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Ultra Crypto CryptoX ActiveX BO

HTTP Ultra Crypto CryptoX ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects an attempt to exploit a buffer overflow vulnerability by passing long arguments into a method of Ultra Crypto Component CryptoX ActiveX Control

Additional Information

Ultra Crypto Component is an ActiveX component for encrypting and decrypting both strings and binary data.

The control is prone to multiple buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data. These issues affect the 'AcquireContext()' and 'DeleteContext()' methods of 'CryptoX.dll'. The ActiveX control can be identified with the following CLSID: 09C282FE-7DE7-4697-9BE2-1C4F4DA825B3.

Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

Affected

  • Ultra Shareware Ultra Crypto Component
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube