Trend Micro HouseCall ActiveX控件库文件远程代码执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1184232 漏洞类型 代码注入
发布时间 2008-12-22 更新时间 2008-12-29
CVE编号 CVE-2008-2434 CNNVD-ID CNNVD-200812-421
漏洞平台 N/A CVSS评分 9.3
|漏洞来源
https://www.securityfocus.com/bid/32965
https://cxsecurity.com/issue/WLB-2008120188
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-421
|漏洞详情
HouseCall是用于检查计算机是否被病毒、间谍软件感染的应用程序。HouseCallActiveX控件(Housecall_ActiveX.dll)的实现中存在错误,远程攻击者可以通过指定自定义的升级服务器向用户系统下载并加载任意库文件。如果将库文件下载到了启动文件夹的话,就会导致在用户开机时执行任意代码。
|漏洞EXP
======================================================================

Secunia Research 22/12/2008

- Trend Micro HouseCall ActiveX Control Arbitrary Code Execution -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software

* Trend Micro HouseCall ActiveX Control 6.51.0.1028 and 6.6.0.1278

NOTE: Other versions may also be affected.

====================================================================== 
2) Severity

Rating: Highly critical
Impact: System comprimse
Where:  Remote

====================================================================== 
3) Vendor's Description of Software

"Trend Micro? HouseCall is an application for checking whether your 
computer has been infected by viruses, spyware, or other malware. 
HouseCall performs additional security checks to identify and fix 
vulnerabilities to prevent reinfection."

Product Link:
http://housecall.trendmicro.com/

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in Trend Micro 
HouseCall, which can be exploited by malicious people to compromise a 
user's system.

The vulnerability is caused due to an implementation error within the
HouseCall ActiveX control (Housecall_ActiveX.dll). This can be 
exploited to e.g. download and load an arbitrary library file by 
specifying a custom update server.

Successful exploitation allows execution of arbitrary code.

====================================================================== 
5) Solution

Remove the ActiveX control and install version 6.6.0.1285.
http://prerelease.trendmicro-europe.com/hc66/launch/

HouseCall Server Edition:
Apply hotfix B1285.

====================================================================== 
6) Time Table

18/08/2008 - Vendor notified.
19/08/2008 - Vendor response.
02/09/2008 - Vendor acknowledges vulnerability.
03/09/2008 - Vendor asks if version 6.6 is also affected.
03/09/2008 - Vendor informed that version 6.6 is not available.
09/09/2008 - Vendor informs that version 6.6 site is now accessible.
18/09/2008 - Vendor informed that version 6.6 is not affected by the
             current exploit, but will be checked in-depth later.
23/09/2008 - Vendor informed that version 6.6 is also vulnerable
             when using a slightly modified exploit.
27/09/2008 - Vendor provides status update.
13/11/2008 - Status update requested.
13/11/2008 - Vendor provides status update.
14/11/2008 - Vendor provides hotfix for testing.
14/11/2008 - Informed the vendor that the supplied hotfix does not 
             address the vulnerability properly.
18/11/2008 - Vendor requests updated exploit.
19/11/2008 - Updated exploit sent to the vendor.
22/12/2008 - Status update requested.
22/12/2008 - Vendor informs that hotfix for SA31583 also fixes this
             vulnerability.
22/12/2008 - Public disclosure.

====================================================================== 
7) Credits

Discovered by Alin Rad Pop, Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2008-2434 for the vulnerability.

====================================================================== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

====================================================================== 
10) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2008-32/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================
|受影响的产品
Trend Micro HouseCall 6.6.0.1278 Trend Micro HouseCall 6.51.0.1028
|参考资料

来源US-CERT:VU#541025
名称:VU#541025
链接:http://www.kb.cert.org/vuls/id/541025
来源:XF
名称:housecall-library-code-execution(47524)
链接:http://xforce.iss.net/xforce/xfdb/47524
来源:BID
名称:32965
链接:http://www.securityfocus.com/bid/32965
来源:BUGTRAQ
名称:20081222SecuniaResearch:TrendMicroHouseCallActiveXControlArbitraryCodeExecution
链接:http://www.securityfocus.com/archive/1/archive/1/499495/100/0/threaded
来源:VUPEN
名称:ADV-2008-3464
链接:http://www.frsirt.com/english/advisories/2008/3464
来源:SREASON
名称:4802
链接:http://securityreason.com/securityalert/4802
来源:MISC
链接:http://secunia.com/secunia_research/2008-32/
来源:SECUNIA
名称:31337
链接:http://secunia.com/advisories/31337
来源:OSVDB
名称:50941
链接:http://osvdb.org/50941
来源:MISC
链接:http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&id=EN-1038646