First published: Wed Jan 23 2008(Updated: )
Multiple buffer overflows in Toshiba Surveillance (Surveillix) RecordSend ActiveX control (MeIpCamX.DLL 1.0.0.4) allow remote attackers to execute arbitrary code via long arguments to the (1) SetPort and (2) SetIpAddress methods.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba Surveillix | =1.0.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0399 is considered to be a high-severity vulnerability due to its potential to allow remote code execution.
Fixing CVE-2008-0399 involves updating the Toshiba Surveillix software to a version that resolves the buffer overflow issues.
CVE-2008-0399 specifically affects the Toshiba Surveillix version 1.0.0.4.
CVE-2008-0399 exploits the SetPort and SetIpAddress methods of the MeIpCamX.DLL ActiveX control.
Remote attackers can exploit CVE-2008-0399 by sending crafted arguments to the vulnerable ActiveX control.