Samsung NET-i Viewer contains multiple vulnerable ActiveX controls. Specifically, STWConfigNVR and STWConfig may allow a virtual function call into arbitrary memory when processing the ConnectDDNS() function. Additionally, the UMS_Ctrl and UMS_Ctrl_STW ActiveX controls contain a stack-based buffer overflow when parsing an excessively long string passed to the fname parameter in the BackupToAvi() function.
- NET-i viewer 1.x
Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
- 16268 - Samsung NET-i Viewer Multiple Vulnerabilities
Set the kill-bit for the vulnerable ActiveX controls: