HTTP: Acer LunchApp.APlunch ActiveX Remote Code Execution

This signature detects attempts to exploit a known vulnerability in Acer. An attacker can create a malicious Web site containing dangerous ActiveX calls using the LunchApp.APlunch member, which if accessed by a victim, allows the attacker to gain control of the client system by remotely executing commands.

Extended Description

Acer LunchApp.APlunch ActiveX is prone to a remote code-execution vulnerability. Exploiting this issue allows remote attackers to execute arbitrary code in the context of applications using the affected ActiveX control and possibly to compromise affected computers. This issue affects Acer TravelMate 4150 and Acer Aspire 5600 notebooks with LunchApp.APlunch version 1.0.

Affected Products

Acer aspire_5600,Microsoft internet_explorer

Short Name
HTTP:STC:CLSID:ACTIVEX:ACER-OBJ
Severity
Minor
Recommended
False
Recommended Action
Drop Packet
Category
HTTP
Keywords
Acer ActiveX CVE-2006-6121 Code Execution LunchApp.APlunch Remote bid:21207
Release Date
12/08/2006
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Acer

Microsoft

CVSS Score

9.3

Found a potential security threat?