eCentrex.VOIP.Client.UACOMX.OCX.ActiveX.Control.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in eCentrex VOIP Client.
The vulnerability is caused by a buffer overflow error in the eCentrex "sip ua com module" (euacom.dll) ActiveX control when processing an overly long argument passed to the "reinit()" method. It can be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.
Affected Products
eCentrex VOIP Client ActiveX Control 2.0.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patches for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |