1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP RavWare RavFLIC ActiveX BO

HTTP RavWare RavFLIC ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in RavWare RavFLIC which could result in remote code execution.

Additional Information

RavWare Flic ActiveX control RavFLIC is an ActiveX control for playing Autodesk FLC/FLI content.

The control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. This issue affects the 'FileName()' method.

The ActiveX control is identified by CLSID: 481BB652-0766-11D2-9830-444553540000 and uses the 'masflc.ocx' file.

An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

Affected

  • RavWare Software RavFLIC ActiveX Control 1.0 1
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube