Short Name |
HTTP:STC:ACTIVEX:ORACLE-DOC-CAP |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Oracle Document Capture ActiveX Control WriteJPG Buffer Overflow |
Release Date |
2011/02/03 |
Update Number |
1859 |
Supported Platforms |
idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known buffer overflow vulnerability in NCSECWLib ActiveX control component included with Oracle Document Capture. It is due to a improper bounds ochecking of arguments within the object's WriteJPG method. Remote attackers can exploit this by enticing target users to visit a malicious Web page. A successful attack can lead to injection and execution of arbitrary code on the target system with the privileges of the logged in user.
Oracle Document Capture is prone to file-overwrite and buffer-overflow vulnerabilities. An attacker can exploit these issues to overwrite arbitrary files, and possibly run arbitrary code. This vulnerability affects the following supported versions: 10.1.3.4, 10.1.3.5