TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
970
Signature ID: 35559
Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite Vulnerability
Threat Level: Severe
Bugtraq: 31984
Signature Description: Visagesoft eXPert PDF Viewer ActiveX control is an application for viewing PDF documents.
It provides a standalone embeddable PDF Viewer for windows application developers. Using Visual Basic, VC, Delphi
or any other programming language been able to handle activex controls, developers can build a customer interface for
viewing and printing pdf documents. PDF documents can be loaded from Streams or files. Visagesoft eXPert PDF
Viewer ActiveX control 3.0.990.0 is vulnerable, other versions may also be affected. The application is prone to a
vulnerability that allows attackers to overwrite files with arbitrary, attacker-supplied content to the
'savePageAsBitmap()' method, doesn't check user supplied arguments, so attacker can save or overwrite a specified file
passed as argument of the 'VSPDFViewerX.ocx' ActiveX control will overwrite files in an insecure manner. By
persuading a victim to visit a malicious Web page containing Hex encoded data, a remote attacker could execute
arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit
attempts will likely result in denial-of-service conditions. No remedy available as of Nov 22, 2008, user can set killbit
to the clsid {BDF3E9D2-5F7A-4F4A-A914-7498C862EA6A}corresponding to the ProgID
VSPDFEditorX.VSPDFEdit to resolve this issue.
Signature ID: 35560
Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite Vulnerability
Threat Level: Severe
Bugtraq: 31984
Signature Description: Visagesoft eXPert PDF Viewer ActiveX control is an application for viewing PDF documents.
It provides a standalone embeddable PDF Viewer for windows application developers. Using Visual Basic, VC, Delphi
or any other programming language been able to handle activex controls, developers can build a customer interface for
viewing and printing pdf documents. PDF documents can be loaded from Streams or files. Visagesoft eXPert PDF
Viewer ActiveX control 3.0.990.0 is vulnerable, other versions may also be affected. The application is prone to a
vulnerability that allows attackers to overwrite files with arbitrary, attacker-supplied content to the
'savePageAsBitmap()' method, doesn't check user supplied arguments, so attacker can save or overwrite a specified file
passed as argument of the 'VSPDFViewerX.ocx' ActiveX control will overwrite files in an insecure manner. By
persuading a victim to visit a malicious Web page containing %u encoded data, a remote attacker could execute
arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit
attempts will likely result in denial-of-service conditions. No remedy available as of Nov 22, 2008, user can set killbit
to the clsid {BDF3E9D2-5F7A-4F4A-A914-7498C862EA6A}corresponding to the ProgID
VSPDFEditorX.VSPDFEdit to resolve this issue.
Signature ID: 35561
Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite Vulnerability
Threat Level: Severe
Bugtraq: 31984
Signature Description: Visagesoft eXPert PDF Viewer ActiveX control is an application for viewing PDF documents.
It provides a standalone embeddable PDF Viewer for windows application developers. Using Visual Basic, VC, Delphi
or any other programming language been able to handle activex controls, developers can build a customer interface for
viewing and printing pdf documents. PDF documents can be loaded from Streams or files. Visagesoft eXPert PDF
Viewer ActiveX control 3.0.990.0 is vulnerable, other versions may also be affected. The application is prone to a
vulnerability that allows attackers to overwrite files with arbitrary, attacker-supplied content to the
'savePageAsBitmap()' method, doesn't check user supplied arguments, so attacker can save or overwrite a specified file
passed as argument of the 'VSPDFViewerX.ocx' ActiveX control will overwrite files in an insecure manner. By
persuading a victim to visit a malicious Web page containing Unicode encoded value of progid, a remote attacker could
execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed