1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP MailBee Objects ActiveX File Overwrite

HTTP MailBee Objects ActiveX File Overwrite

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempt to exploit a file overwrite vulnerability by passing specially crafted arguments into a method of MailBee Objects ActiveX Control.

Additional Information

MailBee Objects ActiveX control is prone to multiple vulnerabilities that allow attackers to create or overwrite arbitrary data with the privileges of the application using the control (typically Internet Explorer).

Successful exploits can compromise affected computers or cause denial-of-service conditions; other attacks are possible.


  • MailBee Objects 5.5 is vulnerable; other versions may also be affected.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube