Short Name |
HTTP:STC:DL:MFC-DOC-TITLE |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Windows MFC Document Title Updating Buffer Overflow |
Release Date |
2010/09/29 |
Update Number |
1782 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known stack buffer overflow vulnerability in Microsoft Windows MFC library mfc42.dll. It is due to a boundary error while handling crafted archive files. It can be exploited through a 3rd party application, such as PowerZip, that utilizes the affected library. Remote attackers can exploit this by enticing target users to open a malicious archive file in an application that uses the affected MFC library. Successful exploitation can result in arbitrary code execution with the privileges of the logged on user.
The Microsoft Windows MFC library is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks of user-supplied input. Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of applications that use the vulnerable method. Failed exploit attempts will likely result in a denial-of-service condition. The issue affects the 'mfc42.dll' MFC library version 6.2.4131.0 included with Microsoft Windows XP SP2 and XP SP3; other versions may also be affected.