1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Chilkat ASP String ActiveX File Overwrite

HTTP Chilkat ASP String ActiveX File Overwrite

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempt to exploit a file overwrite vulnerability by passing specially crafted arguments into a method of Chilkat ASP String ActiveX Control.

Additional Information

Chilkat ASP String is an ActiveX control that allows users to manipulate and evaluate string data.

The ActiveX control is prone to a vulnerability that lets attackers overwrite arbitrary files on the victim's computer in the context of the vulnerable application using the ActiveX control (typically Internet Explorer). This issue occurs because the application fails to sanitize user-supplied input to the 'SaveToFile' method of the 'CkString.dll' library. This issue occurs in the ActiveX control with CLSID: 90E567DA-5E79-4571-AB07-7A397FFBE995.

An attacker can exploit this issue to overwrite arbitrary files on the victim's computer in the context of the vulnerable application using the ActiveX control (typically Internet Explorer).

Chilkat ASP String 1.1 is vulnerable; other versions may also be affected.

Affected

  • Chilkat ASP String 1.1
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube