Zenturi.ProgramCheker.ActiveX.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a memory corruption vulnerability in Zenturi ProgramChecker.
The vulnerability is located in the "sasatl.dll" ActiveX control through the improper usage of "DebugMsgLog" or "DoFileProperties" methods. It may allow remote attackers to execute arbitrary code in the context of the application using the affected ActiveX control. Failed exploit attempts will likely cause the program to crash,resulting in a denial of service condition.

affected-products-logoAffected Products

Zenturi ProgramChecker ActiveX Control.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are not aware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)