eCentrex.VOIP.Client.UACOMX.OCX.ActiveX.Control.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a Buffer Overflow vulnerability in eCentrex VOIP Client.
The vulnerability is caused by a buffer overflow error in the eCentrex "sip ua com module" (euacom.dll) ActiveX control when processing an overly long argument passed to the "reinit()" method. It can be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

affected-products-logoAffected Products

eCentrex VOIP Client ActiveX Control 2.0.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are not aware of any vendor supplied patches for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)