Short Name |
HTTP:STC:ACTIVEX:NSKEY-DLL |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Windows Media Services ActiveX Control |
Release Date |
2008/09/11 |
Update Number |
1259 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the Microsoft Windows Media Services ActiveX Control (NSKEY.DLL). An attacker can create Web pages containing dangerous ActiveX calls, which if accessed by a user, allows the attacker to run arbitrary code on the user's computer.
The Microsoft Windows Media Services ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions. 'nskey.dll' 4.1.00.3917 is vulnerable; other versions may also be affected.