HTTP: Microsoft Visual Basic for Applications Stack Memory Corruption

This signature detects attempts to exploit a known vulnerability in the Microsoft Visual Basic for Applications Library. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Extended Description

Microsoft Visual Basic for Applications (VBA) is prone to a remote stack-based buffer-overflow vulnerability because of an error related to searching for embedded ActiveX controls within a Microsoft Office document. An attacker could exploit this issue to corrupt stack memory and execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts may crash applications that use VBA.

Affected Products

Ibm catia_v5

Short Name
HTTP:STC:DL:VBA-MEM-CORRUPT
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Applications Basic CVE-2010-0815 Corruption Memory Microsoft Stack Visual bid:39931 for
Release Date
05/11/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3725
False Positive
Unknown
Vendors

Microsoft

Ibm

CVSS Score

9.3

Found a potential security threat?