1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Sascam Webcam Server ActiveX BO

HTTP Sascam Webcam Server ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects an attempt to exploit a buffer overflow vulnerability in SasCam Webcam Server ActiveX control.

Additional Information

SasCam Webcam Server is a web-camera application available for Microsoft Windows.

The application is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. The vulnerability affects the 'Get()' method of the ActiveX control identified by CLSID:


An attacker can exploit this issue to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in denial-of-service conditions.

SasCam Webcam Server 2.6.5 is vulnerable; other versions may also be affected.


Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube