1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP HxTocCtrl ActiveX Code Exec

HTTP HxTocCtrl ActiveX Code Exec

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempt to exploit a buffer overflow vulnerability by passing long arguments into a method of HxTocCtrl ActiveX Control which may result in remote code execution.

Additional Information

A remote code execution vulnerability exists in the component hxvz.dll. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user.

To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2008-1086.

Affected

  • Windows 2000 SP4 with Internet Explorer 5.01 SP4
  • Windows 2000 SP4 with Internet Explorer 6 SP1
  • Windows XP SP2 with Internet Explorer 6
  • Windows XP Prof x64 Edition with Internet Explorer 6
  • Windows XP Prof x64 Edition SP2 with Internet Explorer 6
  • Windows Server 2003 SP1 with Internet Explorer 6
  • Windows Server 2003 SP2 with Internet Explorer 6
  • Windows Server 2003 x64 Edition with Internet Explorer 6
  • Windows Server 2003 x64 Edition SP2 with Internet Explorer 6
  • Windows Server 2003 with SP1 for Itanium-based Systems with Internet Explorer 6
  • Windows Server 2003 with SP2 for Itanium-based Systems with Internet Explorer 6
  • Windows XP SP2 with Windows Internet Explorer 7
  • Windows XP Prof x64 Edition with Windows Internet Explorer 7
  • Windows XP Prof x64 Edition SP2 with Internet Explorer 7
  • Windows Server 2003 SP1 with Windows Internet Explorer 7
  • Windows Server 2003 SP2 with Windows Internet Explorer 7
  • Windows Server 2003 x64 Edition with Internet Explorer 7
  • Windows Server 2003 x64 Edition SP2 with Internet Explorer 7
  • Windows Server 2003 with SP1 for Itanium-based Systems with Internet Explorer 7
  • Windows Server 2003 with SP2 for Itanium-based Systems with Internet Explorer 7
  • Windows Vista with Internet Explorer 7
  • Windows Vista SP1 with Internet Explorer 7
  • Windows Vista x64 Edition with Internet Explorer 7
  • Windows Vista x64 Edition SP1 with Internet Explorer 7
  • Windows Server 2008 with Internet Explorer 7
  • Windows Server 2008 x64 Edition with Internet Explorer 7
  • Windows Server 2008 for Itanium-based Systems with Internet Explorer 7

Response

Download and install all vendor patches related to this vulnerability.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube