Short Name |
HTTP:STC:ACTIVEX:TOM-SAMYER-GET |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Tom Sawyer GET Extension Factory COM Object Instantiation ActiveX |
Release Date |
2011/06/10 |
Update Number |
1935 |
Supported Platforms |
idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to use unsafe ActiveX controls in Tom Sawyer GET Extension Factory. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.
Tom Sawyer Software GET Extension Factory is prone to a remote memory-corruption vulnerability. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition. NOTE (June 3, 2011): This BID was previously titled 'VMware Infrastructure (VI) Client ActiveX Object Memory Corruption Vulnerability' but has been rewritten to better reflect the underlying issue.