ELPhoneBtnV6 ActiveX control vulnerable to buffer overflow


ELPhoneBtnV6 ActiveX control was used for "Click to Live" service provided by FreeBit Co., Ltd. Although "Click to Live" service has been discontinued, PCs that used the "Click to Live" service may still have the ActiveX control installed.

ELPhoneBtnV6 ActiveX control, which is provided by the file c2lv6.ocx, contains a buffer overflow vulnerability in the ExecCall() method.

Daiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 6.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial

Affected Products

FreeBit Co., Ltd.
  • ELPhoneBtnV6 ActiveX control


By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user.

[Delete the ELPhoneBtnV6]
"Click to Live" service has been discontinued. It is recommended to delete the ELPhoneBtnV6 ActiveX Control.
Vendor Information

FreeBit Co., Ltd.
CWE (What is CWE?)

  1. Buffer Errors(CWE-119) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2015-5624

  1. JVN : JVN#62078684
  2. National Vulnerability Database (NVD) : CVE-2015-5624
Revision History

  Web page was published
  References : Content was added