Zenturi.ProgramChecker.ActiveX.Fill.Method.Access

description-logoDescription

This indicates a vulnerability in sasatl.dll in Zenturi ProgramChecker. The vulnerability is caused by a stack based buffer overflow in the "Fill" method. It allows remote attackers to execute arbitrary code by sending a crafted web page invoking this ActiveX control.

affected-products-logoAffected Products

Zenturi ProgramChecker ActiveX Control 1.5.531

Impact logoImpact

System compromise, remote code execution.

recomended-action-logoRecommended Actions

Currently we are not aware of any official fix for this issue.
As a work around, set the kill bit for the affected ActiveX control.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-12-11 16.978