HTTP: Vulnerable DHTML ActiveX Control
This signature detects attempts to use unsafe ActiveX controls in Microsoft DHMTL. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser. This technique is frequently used in the wild to bypass the blocking of popup ads.
Extended Description
The Microsoft DHTML Editing Component ActiveX control is prone to a remote code-execution vulnerability. An attacker can exploit this issue by enticing an unsuspecting to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer).
Affected Products
Avaya messaging_application_server,Microsoft windows_2000_server
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nortel_networks
Microsoft
Avaya
9.3
2.6
5.0