SMTP: Microsoft Common Controls MSCOMCTL.OCX Activex Remote Code Execution

This signature detects attempts to use unsafe ActiveX controls in Microsoft MSCOMCTL.OCX. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker perform remote code execution.

Extended Description

The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability."

Affected Products

Microsoft office

References

CVE: CVE-2012-1856

Short Name
SMTP:MSCOMCTL-ACTIVEX
Severity
Major
Recommended
False
Recommended Action
None
Category
SMTP
Keywords
Activex CVE-2012-1856 Code Common Controls Execution MSCOMCTL.OCX Microsoft Remote
Release Date
12/21/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3724
False Positive
Unknown
Vendors

Microsoft

CVSS Score

9.3

Found a potential security threat?