Lucene search

K
nessusThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.FACEBOOK_PHOTO_UPLOADER_4_5_57_1_ACTIVEX_OVERFLOWS.NASL
HistoryFeb 05, 2008 - 12:00 a.m.

Facebook Photo Uploader ActiveX Control < 4.5.57.1 Multiple Buffer Overflows

2008-02-0500:00:00
This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
22

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.769 High

EPSS

Percentile

98.2%

The remote host contains a version of the Facebook Photo Uploader ActiveX control that reportedly is affected by multiple buffer overflows involving, for example, long arguments to the control’s ‘ExtractExif’, ‘ExtractIptc’, and ‘FileMask’ properties. If a remote attacker can trick a user on the affected host into visiting a specially crafted web page, this issue could be leveraged to execute arbitrary code on the affected host subject to the user’s privileges.

#
#  (C) Tenable Network Security, Inc.
#



include("compat.inc");

if (description)
{
  script_id(30152);
  script_version("1.23");

  script_cve_id("CVE-2008-0660", "CVE-2008-5711");
  script_bugtraq_id(27534, 27576, 27756);
  script_xref(name:"EDB-ID", value:"5049");
  script_xref(name:"EDB-ID", value:"5102");
  script_xref(name:"Secunia", value:"28713");

  script_name(english:"Facebook Photo Uploader ActiveX Control < 4.5.57.1 Multiple Buffer Overflows");
  script_summary(english:"Checks version of Facebook Photo Uploader ActiveX control");

 script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an ActiveX control that is affected by
multiple buffer overflow vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The remote host contains a version of the Facebook Photo Uploader
ActiveX control that reportedly is affected by multiple buffer
overflows involving, for example, long arguments to the control's
'ExtractExif', 'ExtractIptc', and 'FileMask' properties.  If a remote
attacker can trick a user on the affected host into visiting a
specially crafted web page, this issue could be leveraged to execute
arbitrary code on the affected host subject to the user's privileges." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Feb/23" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Facebook Photo Uploader version 4.5.57.1 or later as it is
rumored to resolve the issues." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_set_attribute(attribute:"exploited_by_malware", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'Facebook Photo Uploader 4 ActiveX Control Buffer Overflow');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
 script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
 script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');
 script_cwe_id(119);

 script_set_attribute(attribute:"plugin_publication_date", value: "2008/02/05");
 script_cvs_date("Date: 2018/11/15 20:50:26");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);
  exit(0);
}

#

include("global_settings.inc");
include("smb_func.inc");
include("smb_activex_func.inc");


if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);


# Locate the file used by the controls.
if (activex_init() != ACX_OK) exit(0);

clsid = "{5C6698D9-7BE4-4122-8EC5-291D84DBD4A0}";
file = activex_get_filename(clsid:clsid);
if (file)
{
  # Check its version.
  ver = activex_get_fileversion(clsid:clsid);
  if (ver && activex_check_fileversion(clsid:clsid, fix:"4.5.57.1") == TRUE)
  {
    report = NULL;
    if (report_paranoia > 1)
      report = string(
        "Version ", ver, " of the vulnerable control is installed as :\n",
        "\n",
        "  ", file, "\n",
        "\n",
        "Note, though, that Nessus did not check whether the kill bit was\n",
        "set for the control's CLSID because of the Report Paranoia setting\n",
        "in effect when this scan was run.\n"
      );
    else if (activex_get_killbit(clsid:clsid) == 0)
      report = string(
        "Version ", ver, " of the vulnerable control is installed as :\n",
        "\n",
        "  ", file, "\n",
        "\n",
        "Moreover, its kill bit is not set so it is accessible via Internet\n",
        "Explorer.\n"
      );
    if (report)
    {
      if (report_verbosity) security_hole(port:kb_smb_transport(), extra:report);
      else security_hole(kb_smb_transport());
    }
  }
}
activex_end();

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.769 High

EPSS

Percentile

98.2%

Related for FACEBOOK_PHOTO_UPLOADER_4_5_57_1_ACTIVEX_OVERFLOWS.NASL