1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP WebEx Meeting Manager ActiveX BO

HTTP WebEx Meeting Manager ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempt to exploit a buffer overflow vulnerbility by passing long arguments into a method of WebEx Meeting Manager ActiveX Control.

Additional Information

WebEx is file-sharing and conferencing software for Microsoft Windows.

The 'atucfobj' module of WebEx Meeting Manager is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

This issue affects the 'NewObject()' method of the 'atucfobj.dll' ActiveX control library. The control is identified by CLSID: 32E26FD9-F435-4A20-A561-35D4B987CFDC.

An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.


  • 'atucfobj.dll' 20.2008.2601.4928 is vulnerable; other versions may also be affected.


Download and install any vendor patches related to this vulnerability.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube