Vulnerability Description
Multiple heap-based buffer overflows in Topaz Systems SigPlus Pro ActiveX Control 3.95, and possibly other versions before 4.29, allow remote attackers to execute arbitrary code via a long (1) KeyString property, (2) NewPath parameter to the SetLocalIniFilePath method, or (3) NewPortPath parameter to the SetTabletPortPath method.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Topazsystems | Sigplus Pro Activex Control | 3.95 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/42800Vendor Advisory
- http://secunia.com/secunia_research/2011-2/Vendor Advisory
- http://www.securityfocus.com/bid/46128
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65114
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65115
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65116
- http://secunia.com/advisories/42800Vendor Advisory
- http://secunia.com/secunia_research/2011-2/Vendor Advisory
- http://www.securityfocus.com/bid/46128
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65114
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65115
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65116
FAQ
What is CVE-2011-0324?
CVE-2011-0324 is a vulnerability with a CVSS score of 9.3 (HIGH). Multiple heap-based buffer overflows in Topaz Systems SigPlus Pro ActiveX Control 3.95, and possibly other versions before 4.29, allow remote attackers to execute arbitrary code via a long (1) KeyStri...
How severe is CVE-2011-0324?
CVE-2011-0324 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0324?
Check the references section above for vendor advisories and patch information. Affected products include: Topazsystems Sigplus Pro Activex Control.