Executive Summary
Summary | |
---|---|
Title | HP Online Support Services ActiveX StartApp() arbitrary code execution |
Informations | |||
---|---|---|---|
Name | VU#998779 | First vendor Publication | 2008-06-06 |
Vendor | VU-CERT | Last vendor Modification | 2008-06-07 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#998779HP Online Support Services ActiveX StartApp() arbitrary code executionOverviewThe HP Online Support Services ActiveX control contains a method called StartApp(). This may allow a remote, unauthenticated attacker to execute local files on a vulnerable system in the context of the local user.I. DescriptionHP Services provides online product support services including HP Instant Support. The HPISDataManager.dll ActiveX control contains the insecure function StartApp(), which can be exploited by a malicious attacker to execute arbitrary code on a vulnerable system.Note that the HP Support Services ActiveX control is locked to certain domains, such as hp.com. This means that an attacker would have to subvert the host name lookup methodology on a victim's system or exploit a cross-site scripting vulnerability in one of the allowed domains to exploit this vulnerability. From the HP Support Document: The vulnerabilities can also be resolved by the following procedure: Set the kill bit for the vulnerable ActiveX control's Class identifier (CLSID) {14C1B87C-3342-445F-9B5E-365FF330A3AC} . The kill bit is set by modifying the data value of the Compatibility Flags DWORD value for the CLSID of this ActiveX control to 0x00000400. This is explained in Microsoft's article KB240797 or subsequent. http://support.microsoft.com/kb/240797 Systems Affected
References
Hewlett-Packard credits Dennis Rand of CSIS Security Research and Intelligence for discovering this vulnerability. This document was written by Joseph Pruszynski and Will Dormann
|
Original Source
Url : http://www.kb.cert.org/vuls/id/998779 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
46239 | HP Instant Support ActiveX (HPISDataManager.dll) StartApp() Method Arbitrary ... |
46238 | HP Instant Support ActiveX (HPISDataManager.dll) AppendStringToFile() Method ... |
46237 | HP Instant Support ActiveX (HPISDataManager.dll) DeleteSingleFile() Method Ar... |
46236 | HP Instant Support ActiveX (HPISDataManager.dll) RegistryString() Method Over... |
46234 | HP Instant Support ActiveX (HPISDataManager.dll) DownloadFile() Method Arbitr... |
46233 | HP Instant Support ActiveX (HPISDataManager.dll) MoveFile() Method Remote Ove... |
46232 | HP Instant Support ActiveX (HPISDataManager.dll) GetFileTime() Method Remote ... |
46231 | HP Instant Support ActiveX (HPISDataManager.dll) ExtractCab() Method Remote O... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | HP Instant Support DataManager ActiveX function call unicode access RuleID : 13860 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | HP Instant Support DataManager ActiveX function call access RuleID : 13859 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | HP Instant Support DataManager ActiveX clsid unicode access RuleID : 13858 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | HP Instant Support DataManager ActiveX clsid access RuleID : 13857 - Revision : 13 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-08-13 | Name : The remote Windows host is missing a security update containing ActiveX kill ... File : smb_kb_953839.nasl - Type : ACT_GATHER_INFO |
2008-06-05 | Name : The remote Windows host has several ActiveX controls that are affected by mul... File : hpisdatamanager_activex_1_0_0_24.nasl - Type : ACT_GATHER_INFO |