SaschArt.SasCam.Webcam.Server.ActiveX.Control.Get.Method.Access

description-logoDescription

This indicates an attack attempt to exploit a buffer-overflow vulnerability
in SasCam Webcam Server.
The vulnerability is located in the "XHTTP.dll" ActiveX control through
misuse of the "GET" method. It may allow remote attackers to execute
arbitrary code in the context of the application using the affected ActiveX
control. Failed exploit attempts will likely cause the program to crash,
resulting in a denial-of-service condition.

affected-products-logoAffected Products

SasCam WebCam Server Version 2.6.5

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Disable this ActiveX Control by setting its kill bit.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)