1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Sascam Webcam Server ActiveX BO

HTTP Sascam Webcam Server ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects an attempt to exploit a buffer overflow vulnerability in SasCam Webcam Server ActiveX control.

Additional Information

SasCam Webcam Server is a web-camera application available for Microsoft Windows.

The application is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. The vulnerability affects the 'Get()' method of the ActiveX control identified by CLSID:

0297D24A-F425-47EE-9F3B-A459BCE593E3

An attacker can exploit this issue to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in denial-of-service conditions.

SasCam Webcam Server 2.6.5 is vulnerable; other versions may also be affected.

Response

Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube