This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a buffer overflow vulnerability in PDF In-The-Box Active X Control which could result in remote code execution.
The PDF In-The-Box ActiveX Control (PDF_In_The_Box.ocx) is a development tool for creating PDF files programmatically. Logic Print 2013 is a professional application designed to estimate the costs of printing for printing businesses.
The PDF In-The-Box ActiveX Control for Logic Print 2013 is prone to a remote stack-based buffer-overflow vulnerability. Specifically, this issue occurs when handling the 'aPageRef' argument passed to the 'ConnectToSynactis()' method. An attacker can exploit this issue by sending an overly long string.
Successful exploits allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions.
- PDF In-The-Box ActiveX 188.8.131.52 is vulnerable; other versions may also be affected.