Summary
This host is installed with CA eTrust PestPatrol Anti-Spyware and is prone to Buffer Overflow vulnerability.
Impact
Successful exploitation could allow execution of arbitrary code, and cause the victim's browser to crash.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
A Workaround is to set kill bit for the CLSID,
{5e644c49-f8b0-4e9a-a2ed-5f176bb18ce6}
Insight
A Stack-based buffer overflow error in ActiveX control in 'ppctl.dll', which can be caused by persuading a victim to visit a specially-crafted Web page that passes an overly long string argument to the 'Initialize()' method.
Affected
CA eTrust PestPatrol Anti-Spyware
References
- http://www.fortiguard.com/encyclopedia/vulnerability/ca.etrust.pestpatrol.ppctl.dll.activex.access.html
- http://www.metasploit.com/redmine/projects/framework/repository/revisions/7167/entry/modules/exploits/windows/fileformat/etrust_pestscan.rb
- http://xforce.iss.net/xforce/xfdb/54458
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2009-4225 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Audacity Buffer Overflow Vulnerability (Linux)
- Adobe Acrobat and Reader SING 'uniqueName' Buffer Overflow Vulnerability (Linux)
- Adobe Flash Player Multiple Vulnerabilities - Mar09 (Win)
- Adobe Flash CS3 SWF Processing Buffer Overflow Vulnerabilities
- Dell Webcam 'crazytalk4.ocx' ActiveX Multiple BOF Vulnerabilities