Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:ACTIVEX:CHILKAT-FTP2

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Chilkat FTP-2 ActiveX Remote Code Execution

Release Date

2012/05/22

Update Number

2139

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Chilkat FTP-2 ActiveX Remote Code Execution


This signature detects attempts to use unsafe ActiveX controls against Chilkat FTP2. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

The Chilkat FTP2 ActiveX control is prone to multiple insecure-method vulnerabilities. Successful exploits will compromise affected computers or cause denial-of-service conditions; other attacks are possible. Chilkat FTP2 2.6.10 is vulnerable; other versions may also be affected.

Affected Products

  • Chilkat Chilkat FTP2 2.6.10

References

  • BugTraq: 45611

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out