Short Name |
HTTP:STC:CLSID:ACTIVEX:ACER-OBJ |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop Packet |
Category |
HTTP |
Keywords |
Acer LunchApp.APlunch ActiveX Remote Code Execution |
Release Date |
2006/12/08 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Acer. An attacker can create a malicious Web site containing dangerous ActiveX calls using the LunchApp.APlunch member, which if accessed by a victim, allows the attacker to gain control of the client system by remotely executing commands.
Acer LunchApp.APlunch ActiveX is prone to a remote code-execution vulnerability. Exploiting this issue allows remote attackers to execute arbitrary code in the context of applications using the affected ActiveX control and possibly to compromise affected computers. This issue affects Acer TravelMate 4150 and Acer Aspire 5600 notebooks with LunchApp.APlunch version 1.0.