virus logo Client Application Firewall

CA.eTrust.PestPatrol.Ppctl.DLL.ActiveX.Access

description-logoDescription

This indicates an attempt to exploit a code execution vulnerability in CA eTrust PestPatrol.
The vulnerability is located in the "ppctl.dll" ActiveX control through misuse of the "Initialize" method. It may allow remote attackers to execute arbitrary code in vulnerable systems.

affected-products-logoAffected Products

CA eTrust PestPatrol with ppctl.dll (5.6.7.9)

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Set the kill bit for the following CLSID:
{5e644c49-f8b0-4e9a-a2ed-5f176bb18ce6}