Executive Summary

Summary
Title Total Commander File Info plugin vulnerable to denial of service via an out-of-bounds read
Informations
Name VU#813631 First vendor Publication 2015-07-20
Vendor VU-CERT Last vendor Modification 2015-07-20
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#813631

Total Commander File Info plugin vulnerable to denial of service via an out-of-bounds read

Original Release date: 20 Jul 2015 | Last revised: 20 Jul 2015

Overview

Total Commander's File Info plugin version 2.21 attempts an out-of-bounds read when reading a file carefully crafted by an attacker.

Description

CWE-125: Out-of-bounds Read - CVE-2015-2869

An attacker that can control the contents of certain file types may be able to cause an out-of-bounds read error in Total Commander File Plugin version 2.21 by specifying overly large values of certain properties. An attacker who successfully exploits this vulnerability may cause the Total Commander application to unexpectedly terminate.

This attack has been noted in at least two different file types due to the software's improper use of the strncmp function.

  • COFF Archive Library (.lib) files may be used by specifying overly large values for the 'Size' field of the Archive Member Header or the "Number Of Symbols" field in the 1st Linker Member.
  • Linear Executable files may be used by specifying overly large values for the "Resource Table Count" field of the LE Header or the "Object" field at offset 0x8 from a "Resource Table Entry".

    Out-of-bounds reads may allow remote code execution in some circumstances; the CERT/CC is currently unaware of such an attack on the Total Commander File Info plugin, however.

  • Impact

    An attacker may be able to cause the application to terminate.

    Solution

    Apply an update

    Total Commander File Info plugin has released version 2.22, which addresses this issue. Affected users are encouraged to update as soon as possible

    Vendor Information (Learn More)

    VendorStatusDate NotifiedDate Updated
    Total Commander File Info PluginAffected-16 Jul 2015
    If you are a vendor and your product is affected, let us know.

    CVSS Metrics (Learn More)

    GroupScoreVector
    Base4.7AV:L/AC:M/Au:N/C:N/I:N/A:C
    Temporal3.7E:POC/RL:OF/RC:C
    Environmental0.9CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

    References

    • http://blogs.cisco.com/security/talos/fileinfo-plugin-dos
    • http://totalcmd.net/plugring/fileinfo.html

    Credit

    Thanks to Cisco TALOS for reporting this vulnerability to us. Cisco Talos credits Marcin Noga for discovering this vulnerability.

    This document was written by Garret Wassermann.

    Other Information

    • CVE IDs:CVE-2015-2869
    • Date Public:16 Jul 2015
    • Date First Published:20 Jul 2015
    • Date Last Updated:20 Jul 2015
    • Document Revision:36

    Feedback

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Original Source

    Url : http://www.kb.cert.org/vuls/id/813631

    CWE : Common Weakness Enumeration

    % Id Name
    100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

    CPE : Common Platform Enumeration

    TypeDescriptionCount
    Application 2

    Alert History

    If you want to see full details history, please login or register.
    0
    1
    2
    Date Informations
    2015-07-22 05:38:26
    • Multiple Updates
    2015-07-21 21:32:33
    • Multiple Updates
    2015-07-20 17:26:10
    • First insertion