HTTP: Vulnerable DHTML ActiveX Control

This signature detects attempts to use unsafe ActiveX controls in Microsoft DHMTL. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser. This technique is frequently used in the wild to bypass the blocking of popup ads.

Extended Description

The Microsoft DHTML Editing Component ActiveX control is prone to a remote code-execution vulnerability. An attacker can exploit this issue by enticing an unsuspecting to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer).

Affected Products

Avaya messaging_application_server,Microsoft windows_2000_server

References

BugTraq: 11950 36280

CVE: CVE-1999-0487

Short Name
HTTP:STC:ACTIVEX:VULN-DHTML
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ActiveX CVE-1999-0487 CVE-2004-1319 CVE-2008-4846 CVE-2009-2519 Control DHTML Vulnerable bid:11950 bid:36280
Release Date
09/08/2009
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3730
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

Avaya

CVSS Score

9.3

2.6

5.0

Found a potential security threat?