Trend.Micro.HouseCall.notifyOnLoadNative.ActiveX.Access
Description
This indicates an attack attempt to exploit a memory corruption vulnerability in Trend Micro HouseCall.
The vulnerability is located in the "mshtml.dll" ActiveX control through miss-use of "notifyOnLoadNative()" Javascript method. It may allow remote attackers to execute arbitrary code in the context of the application using the affected ActiveX control. Failed exploit attempts will likely cause the program to crash, resulting in a denial of service condition.
Affected Products
Housecall_ActiveX.dll 6.51.0.1028 and earlier versions
Housecall_ActiveX.dll 6.6.0.1278 and earlier versions
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Upgrade to the latest version, available from the vendor web site:
http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&id=EN-1038646
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-08-01 | 25.612 | Name:TrendMicro. HouseCall. notifyOnLoadNative. ActiveX. Access:Trend. Micro. HouseCall. notifyOnLoadNative. ActiveX. Access |
2021-01-11 | 16.995 |