1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. Web Attack: Synactis PDF In-The-Box ActiveX Control BO

Web Attack: Synactis PDF In-The-Box ActiveX Control BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempts to exploit a buffer overflow vulnerability in PDF In-The-Box Active X Control which could result in remote code execution.

Additional Information

The PDF In-The-Box ActiveX Control (PDF_In_The_Box.ocx) is a development tool for creating PDF files programmatically. Logic Print 2013 is a professional application designed to estimate the costs of printing for printing businesses.

The PDF In-The-Box ActiveX Control for Logic Print 2013 is prone to a remote stack-based buffer-overflow vulnerability. Specifically, this issue occurs when handling the 'aPageRef' argument passed to the 'ConnectToSynactis()' method. An attacker can exploit this issue by sending an overly long string.

Successful exploits allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions.


  • PDF In-The-Box ActiveX is vulnerable; other versions may also be affected.


Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube