HTTP: Microsoft Windows Object Packager ClickOnce Object Handling Code Execution
This signature detects attempts to exploit a known vulnerability against Microsoft Windows Object Packager. A successful attack can lead to arbitrary code execution.
Extended Description
Microsoft Windows is prone to a remote code-execution vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a malformed file. Successful exploits can allow attackers to execute arbitrary code within the privileges of the user running the affected application. Note: This issue can also be exploited by embedding other file types such as Python ('.py') or '.jar' files, if the correct interpreter is installed on the vulnerable computer.
Affected Products
Avaya messaging_application_server,Microsoft windows_server_2008_r2_datacenter
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
Avaya
9.3