Executive Summary

Summary
Title IBM Access Support ActiveX control stack buffer overflow
Informations
Name VU#340420 First vendor Publication 2009-03-24
Vendor VU-CERT Last vendor Modification 2009-03-25
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#340420

IBM Access Support ActiveX control stack buffer overflow

Overview

The IBM Access Support ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

I. Description

The IBM Access Support ActiveX control has the ability to collect system information, such as make, model, serial number, OS version, etc. This control is available on the IBM / Lenovo web site, and also may come pre-installed on IBM and Lenovo computer systems. The IBM Access Support ActiveX control, which is provided by IbmEgath.dll, contains a stack buffer overflow in the GetXMLValue() method. We have confirmed that version 3.20.284.0 is vulnerable. Other versions may also contain the flaw.

II. Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.

III. Solution

We are currently unaware of a practical solution to this problem. Please consider the following workarounds:

Disable the IBM Access Support ActiveX control in Internet Explorer

The vulnerable ActiveX control can be disabled in Internet Explorer by setting the kill bit for the following CLSID:

    {74FFE28D-2378-11D5-990C-006094235084}
More information about how to set the kill bit is available in Microsoft Support Document 240797. Alternatively, the following text can be saved as a .REG file and imported to set the kill bit for this control:
    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerActiveX Compatibility{74FFE28D-2378-11D5-990C-006094235084}]
    "Compatibility Flags"=dword:00000400
Disable ActiveX

Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document.

Systems Affected

VendorStatusDate NotifiedDate Updated
IBM CorporationVulnerable2008-08-222009-02-05
LenovoVulnerable2008-08-222009-02-05

References

http://www.kb.cert.org/vuls/id/380277
http://www.cert.org/tech_tips/securing_browser/
http://support.microsoft.com/kb/240797

Credit

Thanks to Chris Weber of Casaba Security for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

Date Public:2009-03-24
Date First Published:2009-03-24
Date Last Updated:2009-03-25
CERT Advisory: 
CVE-ID(s):CVE-2009-0215
NVD-ID(s):CVE-2009-0215
US-CERT Technical Alerts: 
Metric:3.36
Document Revision:15

Original Source

Url : http://www.kb.cert.org/vuls/id/340420

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

SAINT Exploits

Description Link
IBM Access Support ActiveX GetXMLValue buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

Id Description
52958 IBM Access Support ActiveX (IbmEgath.dll) GetXMLValue() Method Overflow

A buffer overflow exists in IBM Access Support ActiveX control. IbmEgath.dll fails to validate data passed to the GetXMLValue() method resulting in a stack overflow. With a specially crafted website, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 IBM Access Support ActiveX GetXMLValue method buffer overflow attempt
RuleID : 16750 - Revision : 3 - Type : WEB-CLIENT
2014-01-10 IBM Access Support ActiveX function call unicode access
RuleID : 16749 - Revision : 3 - Type : WEB-ACTIVEX
2014-01-10 IBM Access Support ActiveX function call access
RuleID : 16748 - Revision : 8 - Type : BROWSER-PLUGINS
2014-01-10 IBM Access Support ActiveX clsid unicode access
RuleID : 16747 - Revision : 3 - Type : WEB-ACTIVEX
2014-01-10 IBM Access Support ActiveX clsid access
RuleID : 16746 - Revision : 10 - Type : BROWSER-PLUGINS
2014-01-10 IBM Access Support ActiveX GetXMLValue method buffer overflow attempt
RuleID : 16610 - Revision : 8 - Type : BROWSER-PLUGINS

Nessus® Vulnerability Scanner

Date Description
2009-06-01 Name : The remote Windows host has an ActiveX control that is affected by a buffer o...
File : ibmegath_activex_getxmlvalue_overflow.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:07:45
  • Multiple Updates