PT-2025-31691 · Synactis +1 · Synactis Pdf In-The-Box +1

Published

2025-08-01

·

Updated

2025-08-01

·

CVE-2013-10057

CVSS v4.0
7.5
VectorAV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions:

Synactis PDF In-The-Box ActiveX control (PDF IN 1.ocx) (affected versions not specified)

Description:

A stack-based buffer overflow vulnerability exists in the `ConnectToSynactis` method of the Synactis PDF In-The-Box ActiveX control (PDF IN 1.ocx). A `strcpy` operation overwrites a saved TRegistry class pointer on the stack when a long string is passed to the method, intended to populate the `ldCmdLine` argument of a WinExec call. This allows remote attackers to execute arbitrary code in the context of the user by enticing them to visit a malicious webpage that instantiates the vulnerable ActiveX control. The vulnerability was discovered through its use in third-party software such as Logic Print 2013.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Code Injection

Stack Overflow

Weakness Enumeration

Related Identifiers

CVE-2013-10057

Affected Products

Logic Print 2013
Synactis Pdf In-The-Box