Zenturi.ProgramChecker.ActiveX.Fill.Method.Access
Description
This indicates a vulnerability in sasatl.dll in Zenturi ProgramChecker. The vulnerability is caused by a stack based buffer overflow in the "Fill" method. It allows remote attackers to execute arbitrary code by sending a crafted web page invoking this ActiveX control.
Affected Products
Zenturi ProgramChecker ActiveX Control 1.5.531
Impact
System compromise, remote code execution.
Recommended Actions
Currently we are not aware of any official fix for this issue.
As a work around, set the kill bit for the affected ActiveX control.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-12-11 | 16.978 |