CA.eTrust.PestPatrol.Ppctl.DLL.ActiveX.Access

description-logoDescription

This indicates an attempt to exploit a code execution vulnerability in CA eTrust PestPatrol.
The vulnerability is located in the "ppctl.dll" ActiveX control through misuse of the "Initialize" method. It may allow remote attackers to execute arbitrary code in vulnerable systems.

affected-products-logoAffected Products

CA eTrust PestPatrol with ppctl.dll (5.6.7.9)

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Set the kill bit for the following CLSID:
{5e644c49-f8b0-4e9a-a2ed-5f176bb18ce6}

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-07-22 15.892 Sig Added
2020-07-14 15.885 Sig Added