SaschArt.SasCam.Webcam.Server.ActiveX.Control.Get.Method.Access
Description
This indicates an attack attempt to exploit a buffer-overflow vulnerability
in SasCam Webcam Server.
The vulnerability is located in the "XHTTP.dll" ActiveX control through
misuse of the "GET" method. It may allow remote attackers to execute
arbitrary code in the context of the application using the affected ActiveX
control. Failed exploit attempts will likely cause the program to crash,
resulting in a denial-of-service condition.
Affected Products
SasCam WebCam Server Version 2.6.5
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Disable this ActiveX Control by setting its kill bit.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |