1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Persits Xupload Activex BO

HTTP Persits Xupload Activex BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in XUpload ActiveX which could result in remote code execution.

Additional Information

The XUpload ActiveX control allows users to upload files to a server.

XUpload is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

This issue affects the 'AddFolder()' method of the 'xupload.ocx' control identified by CLSID {E87F6C8E-16C0-11D3-BEF7-009027438003}. If the method is passed excessive data, a buffer overflow may occur because the method does not verify the length of the user-supplied string before copying it to a finite-sized buffer.

An attacker may exploit this issue to execute arbitrary code in the context of an application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.

Affected

  • Groove Networks Virtual Office 3.1.1 2390
  • HP LoadRunner 8.1, 9.0
  • Persits XUpload 3.0, 2.1 1

Response

Download and install patches from the vendor related to this issue.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube