HTTP: Autodesk MapGuide Viewer ActiveX LayersViewWidth Memory Corruption

This signature detects attempts to use unsafe ActiveX controls in Autodesk MapGuide. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

Autodesk MapGuide ActiveX Control is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the application, typically Internet Explorer, that uses the ActiveX control. Failed exploit attempts will result in denial-of-service conditions. Autodesk MapGuide Viewer 6.5 is vulnerable; other versions may be affected.

Affected Products

Autodesk mapguide_viewer

Short Name
HTTP:STC:ACTIVEX:MAPGUIDE-LAYER
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ActiveX Autodesk Corruption LayersViewWidth MapGuide Memory Viewer bid:42906
Release Date
11/10/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Autodesk

Found a potential security threat?