Bug: Multiple vulnerabilities ( Ascii Version )

Search:
WLB2

Multiple vulnerabilities

Published
Credit
Risk
2007.05.17
Michal Bucko
Medium
CWE
CVE
Local
Remote
N/A
CVE-2007-2606
CVE-2007-2605
CVE-2007-2604
CVE-2007-2603
CVE-2007-2602
Yes
Yes

###################################################################

Multiple vulnerabilities

Michal Bucko (sapheal)
HACKPL Security Labs

####################################################################

The document below was mainly written to support MoAxB, however,
some of the vulnerabilities are in no way connected with ActiveX.
The document covers five vulnerabilities, three of them concern ActiveX
controls.

The list:
[1] Ipswitch WhatsUp v11 MIBEXTRA.EXE Memory Corruption Conditions
[2] Firebird 2.1 Multiple Memory Corruption Conditions
[3] Audio CD Ripper OCX Init Function Denial of Service Vulnerability
[4] FlexLabel ActiveX Control Denial of Service
[5] Brujula Toolbar BRUJULA4.NET.DLL Denial of Service

[1] Ipswitch WhatsUp v11 MIBEXTRA.EXE Memory Corruption Conditions
##################################################################

I. BACKGROUND

WhatsUp Gold v11 - award winning network monitoring software - delivers
on its two promises of blending network monitoring and comprehensive
windows-based application with ease of use, allowing IT managers to turn
network data into actionable business information like trending analysis
and IT resource planning guidance.

II. DESCRIPTION

MIBEXTRA.EXE is one of the WhatsUp's components. It extract WUG data from
MIB files. The component itself is prone to buffer overflow. An overly
long argument passed as a filename would result in application crashing.
Arbitrary code execution is possible. The debugger's output is depicted
below:

EAX 00000000
ECX 41414141
..
EIP 41414141

[2] Firebird 2.1 Multiple Memory Corruption Conditions
######################################################

I. BACKGROUND

Firebird is a RDBMS offering many ANSI SQL features that runs on Linux,
Windows and several Unix platforms. Features excellent concurrency, high
performance and a powerful language for stored procedures and triggers.

II. DESCRIPTION

I haven't gone through the code thoroughly as I bumped into various typical
buffer overrun vulnerabilities. I got off to a flying start when I took a
look at configConfigFile.cpp - a typical buffer overflow vulnerability,
no bounds checking. Going through with (quite a) fine tooth, I found the
similar (more complex than the one found before?) in msgscheck_msgs.epp.

[3] Audio CD Ripper OCX Init Function Denial of Service Vulnerability
#####################################################################

I. BACKGROUND

Audio CD Ripper OCX 1.0 is an ActiveX control for developers. This control
can rip CDA tracks from audio CD to MP3, WMA, WAV, OGG and APE. This
ActiveX
can also deal with the ID3 tags (for destination files), runs on a low
level
mode (based on ASPI), supports many CDs drives, can get general information
about the CD drives, the Audio CD and the CDA Tracks on it. Supports many
events, error handling, runs fast and easy to the use.

II. DESCRIPTION

Function Init() in AudioCDRipperOCX.ocx improperly used results in denial
of service due to null dereference. The vulnerability doesn't allow remote
arbitrary code execution.

[4] FlexLabel ActiveX Control Denial of Service
#####################################################################

I. BACKGROUND

FlexLabel is an enhanced label control...way enhanced! You have complete
control
over everything including font, alignment, mouse-over effect, and angle of
text,
plus the best functionality is that it will automatically create a
hyperlink based
off of simple property settings. You can control whether a mouse click
will link
to email, a website, an FTP site, or user customizable link.

II. DESCRIPTION

FlexLabel ActiveX control fails to work properly when badly initialized.
The
vulnerability does not allow code execution. The simple demonstration would
be:

--//code snippet//--

<object classid='clsid:584B432E-E0BD-4A78-BD77-665591DA84BB' id='target' />
<script language='vbscript'>

arg="A"

target.Caption = arg

</script>

--//end of code snippet//--

[5] Brujula Toolbar BRUJULA4.NET.DLL Denial of Service
#####################################################################

I. BACKGROUND
Brujula.net toolbar is one of toolbars available

II. DESCRIPTION

Access violation due to null dereference leads to denial of service
conditions.
Function GetPropertyById(char*, char*) in SoftomateLib (ISoftomateObj),in
BRUJULA4.NET.DLL, improperly handle the given arguments. Below, we can see
debugger's output:

100283B5 8B51 04 MOV EDX,DWORD PTR DS:[ECX+4]

ECX = 000001A8
DS:[000001AC]=???

[!] DISCLAIMER

This document and all the information it contains are provided "as is",
for educational purposes only, without warranty of any kind, whether
express or implied.

The authors reserve the right not to be responsible for the topicality,
correctness, completeness or quality of the information provided in
this document. Liability claims regarding damage caused by the use of
any information provided, including any kind of information which is
incomplete or incorrect, will therefore be rejected.

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version