SupportSoft ActiveX controls contain multiple buffer overflows

2007-02-23T00:00:00
ID VU:441785
Type cert
Reporter CERT
Modified 2009-04-13T17:12:00

Description

Overview

The SupportSoft ActiveX controls contain multiple buffer overflow vulnerabilities, which could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

SupportSoft provides multiple ActiveX packages that are used by third party vendors to provide remote assistance and other technical support functions. The controls are commonly used by internet service providers (ISPs) and PC manufacturers. The SupportSoft ActiveX control packages contain multiple buffer overflow vulnerabilities. Many of these buffer overflows can be used to overwrite the process Structured Exception Handler (SEH) or otherwise overwrite the contents of the EIP (Extended Instruction Pointer) register, thus gaining control of program execution flow.

According to the SupportSoft ActiveX Controls Security Update, one should search for any of the following files to determine if a system may be vulnerable:
tgctlsi.dll
tgctlins.dll
sdcnetcheck.dll
tgctlar.dll
tgctlch.dll
tgctlpr.dll
tgctlcm.dll
tglib.dll
tgctlidx.dll
Note that since the vulnerable controls are commonly included with third-party software that is not explicitly packaged as "SupportSoft," searching for the above files is the most effective way to determine if a system is vulnerable.


Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.


Solution

Apply an update
Please check with your vendor for an update specific to your vendor's product.

Symantec customers should apply an update, as specified by Symantec advisory SYM07-002.

For customers where the vendor has not supplied an update, please apply an update as specified in the SupportSoft Security Update. This update provides download links to installers for the fixed 6.5.x and 5.6.x controls. Please note that a computer system may have both 6.x and 5.x components installed, which would require installing both update packages.


Disable vulnerable SupportSoft ActiveX controls in Internet Explorer

Vulnerable SupportSoft ActiveX controls can be disabled in Internet Explorer by setting the kill bit for the following CLSIDs:

{01010200-5e80-11d8-9e86-0007e96c65ae}
{01010e00-5e80-11d8-9e86-0007e96c65ae}
{01011300-5e80-11d8-9e86-0007e96c65ae}
{01013A00-5E80-11D8-9E86-0007E96C65AE}
{01013B00-5E80-11D8-9E86-0007E96C65AE}
{01013C00-5E80-11D8-9E86-0007E96C65AE}
{01013D00-5E80-11D8-9E86-0007E96C65AE}
{01013F00-5E80-11D8-9E86-0007E96C65AE}
{01014000-5E80-11D8-9E86-0007E96C65AE}
{01014100-5E80-11D8-9E86-0007E96C65AE}
{01014B00-5E80-11D8-9E86-0007E96C65AE}
{01111c00-3e00-11d2-8470-0060089874ed}
{01111e00-3e00-11d2-8470-0060089874ed}
{01111f00-3e00-11d2-8470-0060089874ed}
{01112500-3e00-11d2-8470-0060089874ed}
{01112800-3e00-11d2-8470-0060089874ed}
{01113300-3e00-11d2-8470-0060089874ed}
{01114200-3e00-11d2-8470-0060089874ed}
{01114300-3e00-11d2-8470-0060089874ed}
{01114400-3e00-11d2-8470-0060089874ed}
{01114500-3e00-11d2-8470-0060089874ed}
{01114600-3e00-11d2-8470-0060089874ed}
{01114700-3e00-11d2-8470-0060089874ed}
{01114800-3e00-11d2-8470-0060089874ed}
{01116e00-3e00-11d2-8470-0060089874ed}

More information about how to set the kill bit is available in Microsoft Support Document 240797. Alternatively, the following text can be saved as a .REG file and imported to set the kill bit for these controls:

`Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility{01010200-5e80-11d8-9e86-0007e96c65ae}]"Compatibility Flags"=dword:00000400`

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01010e00-5e80-11d8-9e86-0007e96c65ae}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01011300-5e80-11d8-9e86-0007e96c65ae}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013A00-5E80-11D8-9E86-0007E96C65AE}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013B00-5E80-11D8-9E86-0007E96C65AE}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013C00-5E80-11D8-9E86-0007E96C65AE}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013D00-5E80-11D8-9E86-0007E96C65AE}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01013F00-5E80-11D8-9E86-0007E96C65AE}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01014000-5E80-11D8-9E86-0007E96C65AE}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01014100-5E80-11D8-9E86-0007E96C65AE}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01014B00-5E80-11D8-9E86-0007E96C65AE}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01111c00-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01111e00-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01111f00-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01112500-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01112800-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01113300-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114200-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114300-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114400-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114500-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114600-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114700-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01114800-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{01116e00-3e00-11d2-8470-0060089874ed}]
"Compatibility Flags"=dword:00000400
Disable ActiveX

Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document.


Vendor Information

441785

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

BellSouth Affected

Updated: February 20, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Comcast Affected

Updated: February 20, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

IBM Corporation Affected

Updated: February 20, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

SupportSoft, Inc. __ Affected

Notified: August 21, 2006 Updated: February 22, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

Please see the SupportSoft Security Update.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Symantec, Inc. __ Affected

Notified: August 22, 2006 Updated: February 22, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

Please see Symantec security advisory SYM07-002.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

TDC Affected

Updated: February 20, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Time Warner Affected

Updated: February 20, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

3M Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Automatic Data Processing Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

BT Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Bank of America Unknown

Updated: February 21, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Belgacom Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Bharti Enterprises Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Bresnan Communications Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Casema Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Charter Communications Unknown

Updated: February 21, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CompuCom Systems Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Computer Sciences Corporation Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Cox Communications Unknown

Updated: February 21, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Essent Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Hilton Hospitality Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

KPN International Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Kimberly-Clark Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Lockheed Martin Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Marriott Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Net Lynk Limited Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Ono Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Portugal Telecom Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Procter & Gamble Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Sony Corporation Unknown

Updated: February 21, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Sunrise Switzerland Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

TalkTalk Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Telefonica Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

TeliaSonera Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Tiscali Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

UPC Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Verizon Unknown

Updated: February 20, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

View all 37 vendors View less vendors

CVSS Metrics

Group | Score | Vector
---|---|---
Base | |
Temporal | |
Environmental | |

References

  • <http://www.supportsoft.com/support/controls_update.asp>
  • <http://www.supportsoft.com/support/Security%20Advisory%202006-01-V2007.pdf>
  • <http://www.symantec.com/avcenter/security/Content/2007.02.22.html>
  • <http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=478>
  • <http://support.microsoft.com/kb/240797>
  • <http://secunia.com/advisories/24246/>
  • <http://secunia.com/advisories/24251/>
  • <http://news.com.com/Flaws+in+tech+support+tools+open+PCs+to+attack/2100-1002_3-6162278.html>
  • <http://www.securityfocus.com/bid/22564>

Acknowledgements

This vulnerability was reported by Will Dormann of CERT/CC. It was also independently discovered by Mark Litchfield of NGS Software and Peter Vreugdenhil.

This document was written by Will Dormann.

Other Information

CVE IDs: | CVE-2006-6490
---|---
Severity Metric: | 15.15
Date Public: | 2007-02-22
Date First Published: | 2007-02-23
Date Last Updated: | 2009-04-13 17:12 UTC
Document Revision: | 35