Oracle Outside-In FPX File Parsing Heap Overflow

2012.07.21
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

##################################################################################### Application: Oracle Outside-In FPX File Parsing Heap Overflow Version: he vulnerabilities are reported in versions 8.3.5 and 8.3.7. Exploitation: Remote code execution Secunia Number: SA49936 {PRL}: 2012-26 Author: Francis Provencher (Protek Research Lab's) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ##################################################################################### 1) Introduction 2) Timeline 3) Technical details 4) PoC ##################################################################################### =============== 1) Introduction =============== Oracle Outside In Technology provides software developers with a comprehensive solution to access, transform, and control the contents of over 500 unstructured file formats. From the latest office suites, such as Microsoft Office 2007, to specialty formats and legacy files, Outside In Technology provides software developers with the tools to transform unstructured files into controllable information. ##################################################################################### ============ 2) Timeline ============ 2012-05-02 - Vulnerability reported to secunia 2012-07-19 - Coordinated public release of advisory ##################################################################################### ================= 3) Technical details ================= An error in the FPX graphic import filter (ibfpx2.flt) when processing FPX images can be exploited to cause a heap-based buffer overflow via a specially crafted file. ##################################################################################### ============= 4) The Code ============= http://www.protekresearchlab.com/exploits/PRL-2012-26.fpx http://www.exploit-db.com/sploits/19960.fpx

References:

http://www.protekresearchlab.com/exploits/PRL-2012-26.fpx
http://www.exploit-db.com/sploits/19960.fpx


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top