1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Web Attack: Persits Software XUpload ActiveX BO

Web Attack: Persits Software XUpload ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects an attempt to exploit a buffer overflow vulnerability in Persits Software XUpload ActiveX control.

Additional Information

The XUpload ActiveX control allows users to upload files to a server.

XUpload is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

This issue affects the 'AddFile()' method of the 'xupload.ocx' control identified by CLSID {E87F6C8E-16C0-11D3-BEF7-009027438003}. If the method is passed excessive data, a buffer overflow may occur because the method fails to verify the length of the user-supplied string before copying it to a finite-sized buffer.

An attacker may exploit this issue to execute arbitrary code in the context of an application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.

'xupload.ocx' of XUpload 3.0 is vulnerable; other versions may also be affected.


  • Persits XUpload 3.0
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube