Short Name |
HTTP:STC:DL:VBA-MEM-CORRUPT |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Visual Basic for Applications Stack Memory Corruption |
Release Date |
2010/05/11 |
Update Number |
1678 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Microsoft Visual Basic for Applications Library. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Microsoft Visual Basic for Applications (VBA) is prone to a remote stack-based buffer-overflow vulnerability because of an error related to searching for embedded ActiveX controls within a Microsoft Office document. An attacker could exploit this issue to corrupt stack memory and execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts may crash applications that use VBA.