Short Name |
HTTP:STC:ACTIVEX:HONEYWELL-TEMA |
---|---|
Severity |
Minor |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Honeywell EBI TEMA Remote Installer Unsafe ActiveX Control Arbitrary File Download |
Release Date |
2013/01/16 |
Update Number |
2225 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to use unsafe ActiveX controls in Honeywell EBI TEMA Remote Installer. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.
Honeywell EBI is prone to a vulnerability that exists in the TEMA installer and can allow malicious files to be downloaded and saved to arbitrary locations on an affected computer. Successful exploits will allow attackers to download a malicious file onto a victims computer and execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). This issue affects the following versions of EBI and corresponding versions of TEMA: EBI R310.1 - TEMA 4.8 EBI R310.1 - TEMA 4.9 EBI R310.1 - TEMA 4.10 EBI R400.2 SP1 - TEMA 5.2 EBI R410.1 - TEMA 5.3.0 EBI R410.2 - TEMA 5.3.1.