1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP FullRemoteDisplay Dev Kit ActiveX BO CVE-2007-2623

HTTP FullRemoteDisplay Dev Kit ActiveX BO CVE-2007-2623

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in FullRemoteDisplay.

Additional Information

FullRemoteDisplay is an ActiveX control that provides remote access to computers. Development Kit is a library ('RControl.dll') that adds support functionality to FullRemoteDisplay.

FullRemoteDisplay is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input data before copying it to an insufficiently sized buffer.

This issue occurs when an excessive amount of data is passed to the 'target()' function of the 'RControl.dll' library via the 'Connect' or 'InternalServer' methods.

Attackers can exploit this issue to crash the browsers of unsuspecting users, resulting in a denial of service. Remote code execution may also be possible, but has not been confirmed.

FullRemoteDisplay uses CLSID: 2A515FCD-C0E9-4F38-9C77-2949514366F2.

NOTE: This issue is conjectured to stem from a heap-based buffer-overflow issue in 'ntdll.dll', but this has not been confirmed.

Development Kit 1.2.1.0 is vulnerable; other versions may also be affected.

Affected

  • Remote helpdesk software Development Kit 1.2.1.0
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube