Lucene search

K
certCERTVU:312073
HistoryNov 16, 2005 - 12:00 a.m.

First4Internet CodeSupport ActiveX controls incorrectly marked 'safe for scripting'

2005-11-1600:00:00
www.kb.cert.org
6

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.244 Low

EPSS

Percentile

96.6%

Overview

An ActiveX control used to uninstall XCP Digital Rights Management (DRM) software made by First 4 Internet and distributed on some Sony BMG audio CDs is marked “Safe for scripting”

Description

XCP Digital Rights Management (DRM) software by First 4 Internet, which is distributed by some Sony BMG audio CDs. The XCP copy protection software uses “rootkit” technology to hide certain files from the user. A problem has been reported in an ActiveX control used to uninstall this software.

It has been reported that upon submitting a request to uninstall the DRM software, the user will receive via email a link to a Sony BMG web page. This page will attempt to install an ActiveX control when it is displayed in Internet Explorer. This ActiveX control is marked “Safe for scripting,” which means that any web page may be able to utilize the control and its methods. Some of the methods provided by this control appear to present security problems, as they may allow an attacker to download and execute arbitrary code.


Impact

It has been reported the ActiveX control used to uninstall XCP DRM software may allow remote attackers to download and execute arbitrary code on vulnerable systems. The ActiveX control will only execute code that is packaged in a certain file format.


Solution

Set the kill-bit for CLSID {4EA7C4C5-C5C0-4F5C-A008-8293505F71CC} after uninstalling the XCP DRM software.


As an alternative, disable ActiveX controls in Internet Explorer after uninstalling the XCP DRM software. Removing the vulnerable control may also limit the potential risk reported for the CodeSupport control:

cmd /k del “%windir%\downloaded program files\codesupport.ocx”


Vendor Information

Javascript is disabled. Click here to view vendors.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This report has been publicly credited to Matti Nikki, with additional information provided by J. Alex Halderman and Ed Felten.

This document was written by Jeffrey Havrilla.

Other Information

CVE IDs: CVE-2005-3650
Severity Metric: 7.76 Date Public:

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.244 Low

EPSS

Percentile

96.6%

Related for VU:312073