1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP RTSP Mpeg4 Control ActiveX BO

HTTP RTSP Mpeg4 Control ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempt to exploit a buffer overflow vulnerability by passing long arguments into a property of RTSP MPEG4 SP Control ActiveX Control.

Additional Information

There is a buffer overflow vulnerability in RTSP MPEG4 SP Control, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error in the RtspVaPgCtrl Class ActiveX control when handling strings assigned to the "Url" property. This can be exploited to cause a stack-based buffer overflow by assigning an overly long string to the affected property.

Successful exploitation allows execution of arbitrary code.

The vulnerability is confirmed in RtspVapgDecoder.dll version 1.1.0.29 and reported in RtspVapgDecoderNew.dll version 2.0.0.39. Other versions may also be affected.

Affected

  • The vulnerability is confirmed in RtspVapgDecoder.dll version 1.1.0.29 and reported in RtspVapgDecoderNew.dll version 2.0.0.39. Other versions may also be affected.

Response

Download and install the latest patches from the vendor regarding this issue.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube