Executive Summary
Summary | |
---|---|
Title | Microsoft MFC FindFile function heap buffer overflow |
Informations | |||
---|---|---|---|
Name | VU#611008 | First vendor Publication | 2007-09-20 |
Vendor | VU-CERT | Last vendor Modification | 2007-09-20 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#611008Microsoft MFC FindFile function heap buffer overflowOverviewA buffer overflow vulnerability in the Microsoft Foundation Class (MFC) Library could allow an attacker to execute arbitrary code on an affected system.I. DescriptionThe Microsoft Foundation Class (MFC) Library is a Microsoft library that wraps parts of the Windows API in C++ classes. The MFC libraries contain a function called FindFile(). The FindFile() function manages file searches across a filesystem, enabling users to specify the type of file to search.MFC is included in Microsoft Visual Studio and Microsoft Windows. MFC is also used in Hewlett-Packard All-in-One and in Hewlett-Packard Photo and Imaging Gallery. Note, however, that the use of MFC library is not necessarily limited to these applications; other applications may also be using the vulnerable libraries. Additionally, the list of vendors under the "Systems Affected" section of this vulnerability may not be an exhaustive list.
Note, however, that the MFC libraries can be used by multiple applications on most systems. Once a solution is made available by the vendor, it may be necessary for application users (system administrators, developers) to upgrade or apply multiple patches and then recompile statically linked applications.
Note this is an iterative process for each set of patches being applied. Systems Affected
References
This vulnerability was reported by Jonathan Sarba of GoodFellas Security Research Team. This document was written by Joseph Pruszynski.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/611008 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Hardware | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
37105 | Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function ... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows MFC Library ActiveX function call unicode access RuleID : 12615 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Windows MFC Library ActiveX function call access RuleID : 12614 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows MFC Library ActiveX clsid unicode access RuleID : 12613 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Windows MFC Library ActiveX clsid access RuleID : 12612 - Revision : 11 - Type : BROWSER-PLUGINS |