TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
969
Signature ID: 35556
Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite Vulnerability
Threat Level: Severe
Bugtraq: 31984
Signature Description: Visagesoft eXPert PDF Viewer ActiveX control is an application for viewing PDF documents.
It provides a standalone embeddable PDF Viewer for windows application developers. Using Visual Basic, VC, Delphi
or any other programming language been able to handle activex controls, developers can build a customer interface for
viewing and printing pdf documents. PDF documents can be loaded from Streams or files. Visagesoft eXPert PDF
Viewer ActiveX control 3.0.990.0 is vulnerable, other versions may also be affected. The application is prone to a
vulnerability that allows attackers to overwrite files with arbitrary, attacker-supplied content to the
'savePageAsBitmap()' method, doesn't check user supplied arguments, so attacker can save/overwrite a specified file
passed as argument of the 'VSPDFViewerX.ocx' ActiveX control will overwrite files in an insecure manner. By
persuading a victim to visit a malicious Web page contains %u encoded data, a remote attacker could execute arbitrary
code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts
will likely result in denial-of-service conditions. No remedy available as of Nov 22, 2008, user can set killbit to the
clsid {BDF3E9D2-5F7A-4F4A-A914-7498C862EA6A}.
Signature ID: 35557
Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite Vulnerability
Threat Level: Severe
Bugtraq: 31984
Signature Description: Visagesoft eXPert PDF Viewer ActiveX control is an application for viewing PDF documents.
It provides a standalone embeddable PDF Viewer for windows application developers. Using Visual Basic, VC, Delphi
or any other programming language been able to handle activex controls, developers can build a customer interface for
viewing and printing pdf documents. PDF documents can be loaded from Streams or files. Visagesoft eXPert PDF
Viewer ActiveX control 3.0.990.0 is vulnerable, other versions may also be affected. The application is prone to a
vulnerability that allows attackers to overwrite files with arbitrary, attacker-supplied content to the
'savePageAsBitmap()' method, doesn't check user supplied arguments, so attacker can save/overwrite a specified file
passed as argument of the 'VSPDFViewerX.ocx' ActiveX control will overwrite files in an insecure manner. By
persuading a victim to visit a malicious Web page contains UTF-16 encoded data, a remote attacker could execute
arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit
attempts will likely result in denial-of-service conditions. No remedy available as of Nov 22, 2008, user can set killbit
to the clsid {BDF3E9D2-5F7A-4F4A-A914-7498C862EA6A}.
Signature ID: 35558
Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite Vulnerability
Threat Level: Warning
Bugtraq: 31984
Signature Description: Visagesoft eXPert PDF Viewer ActiveX control is an application for viewing PDF documents.
It provides a standalone embeddable PDF Viewer for windows application developers. Using Visual Basic, VC, Delphi
or any other programming language been able to handle activex controls, developers can build a customer interface for
viewing and printing pdf documents. PDF documents can be loaded from Streams or files. Visagesoft eXPert PDF
Viewer ActiveX control 3.0.990.0 is vulnerable, other versions may also be affected. The application is prone to a
vulnerability that allows attackers to overwrite files with arbitrary, attacker-supplied content to the
'savePageAsBitmap()' method, doesn't check user supplied arguments, so attacker can save or overwrite a specified file
passed as argument of the 'VSPDFViewerX.ocx' ActiveX control will overwrite files in an insecure manner. By
persuading a victim to visit a malicious Web page, a remote attacker could execute arbitrary code in the context of the
application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-
of-service conditions. No remedy available as of Nov 22, 2008, user can set killbit to the clsid {BDF3E9D2-5F7A-
4F4A-A914-7498C862EA6A}corresponding to the ProgID VSPDFEditorX.VSPDFEdit to resolve this issue.