Multiple vulnerabilities

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1052953 漏洞类型
发布时间 2007-05-17 更新时间 2007-05-17
CVE编号 CVE-2007-2606
CVE-2007-2605
CVE-2007-2604
CVE-2007-2603
CVE-2007-2602
CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2007050062
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
###################################################################

Multiple vulnerabilities

Michal Bucko (sapheal)
 HACKPL Security Labs

####################################################################

The document below was mainly written to support MoAxB, however,
 some of the vulnerabilities are in no way connected with ActiveX.
 The document covers five vulnerabilities, three of them concern ActiveX
 controls.

The list:
 [1]  Ipswitch WhatsUp v11 MIBEXTRA.EXE Memory Corruption Conditions
 [2] Firebird 2.1 Multiple Memory Corruption Conditions
 [3]  Audio CD Ripper OCX Init Function Denial of Service Vulnerability
 [4]  FlexLabel ActiveX Control Denial of Service
 [5] Brujula Toolbar BRUJULA4.NET.DLL Denial of Service

[1] Ipswitch WhatsUp v11 MIBEXTRA.EXE Memory Corruption Conditions
 ##################################################################

I.  BACKGROUND

WhatsUp Gold v11 - award winning network monitoring software - delivers
  on its two promises of blending network monitoring and comprehensive
 windows-based application with ease of use, allowing IT managers to turn
   network data into actionable business information like trending analysis
 and IT resource planning guidance.

II. DESCRIPTION

MIBEXTRA.EXE is one of the WhatsUp's components. It extract WUG data from
 MIB files. The component itself is prone to buffer overflow. An overly
 long argument passed as a filename would result in application crashing.
 Arbitrary code execution is possible. The debugger's output is depicted
 below:

EAX 00000000
 ECX 41414141
 ..
 EIP 41414141

[2] Firebird 2.1 Multiple Memory Corruption Conditions
 ######################################################

I.  BACKGROUND

Firebird is a RDBMS offering many ANSI SQL features that runs on Linux,
 Windows and several Unix platforms. Features excellent concurrency, high
 performance and a powerful language for stored procedures and triggers.

II. DESCRIPTION

I haven't gone through the code thoroughly as I bumped into various typical
 buffer overrun vulnerabilities. I got off to a flying start when I took a
 look at config\ConfigFile.cpp - a typical buffer overflow vulnerability,
 no bounds checking. Going through with (quite a) fine tooth, I found the
 similar (more complex than the one found before?) in msgs\check_msgs.epp.

[3] Audio CD Ripper OCX Init Function Denial of Service Vulnerability
 #####################################################################

I.  BACKGROUND

Audio CD Ripper OCX 1.0 is an ActiveX control for developers. This control
 can rip CDA tracks from audio CD to MP3, WMA, WAV, OGG and APE. This 
ActiveX
  can also deal with the ID3 tags (for destination files), runs on a low 
level
 mode (based on ASPI), supports many CDs drives, can get general information
 about the CD drives, the Audio CD and the CDA Tracks on it. Supports many
 events, error handling, runs fast and easy to the use.

II. DESCRIPTION

Function Init() in AudioCDRipperOCX.ocx improperly used results in denial
 of service due to null dereference. The vulnerability doesn't allow remote
 arbitrary code execution.

[4] FlexLabel ActiveX Control Denial of Service
 #####################################################################

I.  BACKGROUND

FlexLabel is an enhanced label control...way enhanced! You have complete 
control
 over everything including font, alignment, mouse-over effect, and angle of 
text,
 plus the best functionality is that it will automatically create a 
hyperlink based
  off of simple property settings. You can control whether a mouse click 
will link
 to email, a website, an FTP site, or user customizable link.

II. DESCRIPTION

FlexLabel ActiveX control fails to work properly when badly initialized. 
The
 vulnerability does not allow code execution. The simple demonstration would 
be:

--//code snippet//--

<object classid='clsid:584B432E-E0BD-4A78-BD77-665591DA84BB' id='target' />
 <script language='vbscript'>

arg="A"

target.Caption = arg

</script>

--//end of code snippet//--

[5] Brujula Toolbar BRUJULA4.NET.DLL Denial of Service
 #####################################################################

I.  BACKGROUND
 Brujula.net toolbar is one of toolbars available

II. DESCRIPTION

Access violation due to null dereference leads to denial of service 
conditions.
 Function GetPropertyById(char*, char*) in SoftomateLib (ISoftomateObj),in
 BRUJULA4.NET.DLL, improperly handle the given arguments. Below, we can see
 debugger's output:

100283B5   8B51 04          MOV EDX,DWORD PTR DS:[ECX+4]

ECX = 000001A8
 DS:[000001AC]=???

[!] DISCLAIMER

This document and all the information it contains are provided "as  is",
 for  educational  purposes  only,  without warranty of any kind, whether
 express or implied.

The authors reserve the right not to be responsible for the  topicality,
 correctness,  completeness  or  quality  of the information  provided in
 this document. Liability claims regarding damage caused by  the  use  of
 any  information  provided,  including  any kind of information which is
 incomplete or incorrect, will therefore be rejected.