1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Logitech VideoCall ActiveX BO

HTTP Logitech VideoCall ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in the Logitech VideoCall Control which may allow remote code execution.

Additional Information

Logitech VideoCall is an application that permits users to communicate through the internet via video and sound.

Multiple Logitech VideoCall ActiveX controls are prone to multiple buffer-overflow vulnerabilities because they fail to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

These issues occur when an excessive amount of data is passed to multiple unspecified methods.

These issues reside in the following DLLs and ActiveX controls with the following CLSIDs:

vibecontrol.dll: CLSID:{54da0fb5-483a-4c53-810b-f131d50a8eb6}
StarClient.dll: CLSID:{6577b09d-c39d-4e22-9913-c99803f9c388}
StarClient.dll: CLSID:{917b29f8-e72a-4761-8371-bf7fca27eb31}
uicomlink.dll: CLSID:{bef0f488-3562-435f-8e89-79d94c9a528c}
wcamxmp.dll: CLSID{bf4c7b03-f381-4544-9a33-cb6dad2a87cd}

Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

Affected

  • Logitech VideoCall

Response

Download and install all vendor patches related to this vulnerability.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube