1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP EDraw PDF Viewer ActiveX FO

HTTP EDraw PDF Viewer ActiveX FO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects an attempt to exploit an Arbitrary File Overwrite Vulnerability in Edraw PDF Viewer Component ActiveX control.

Additional Information

Edraw PDF Viewer Component is an ActiveX control used to display PDF documents.

The application is prone to a vulnerability that allows attackers to overwrite arbitrary local files. Specifically, the 'FtpDownloadFile()' method of the 'pdfviewer.ocx' ActiveX control will overwrite files in an insecure manner. The control is identified by CLSID:


Successful exploits will allow an attacker to corrupt and overwrite arbitrary files on the victim's computer in the context of the vulnerable application using the ActiveX control (typically Internet Explorer).

Versions prior to PDF Viewer Component are vulnerable.


  • EDraw PDF Viewer Component 3.2


Updates are reported to be available; please see the references for more information.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube