Lucene search

K
nessusThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.OFFICEVIEWER_FTPDOWNLOADFILE_ACTIVEX_OVERFLOW.NASL
HistoryMar 04, 2008 - 12:00 a.m.

EDraw Office Viewer ActiveX (EDraw.OfficeViewer) FtpDownloadFile Method Overflow

2008-03-0400:00:00
This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
18

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.228 Low

EPSS

Percentile

96.6%

The remote host contains the EDraw Office Viewer Component, an ActiveX control for working with Microsoft Office documents.

The version of this control installed on the remote host contains a buffer overflow that can be triggered by a long value for the first and second arguments of the ‘FtpDownloadFile’ method. If an attacker can trick a user on the affected host into visiting a specially crafted web page, this method could be used to execute arbitrary code on the affected system subject to the user’s privileges.

#
#  (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(31348);
  script_version("1.14");

  script_cve_id("CVE-2007-5257");
  script_bugtraq_id(25892);
  script_xref(name:"EDB-ID", value:"4474");
  script_xref(name:"Secunia", value:"27017");

  script_name(english:"EDraw Office Viewer ActiveX (EDraw.OfficeViewer) FtpDownloadFile Method Overflow");
  script_summary(english:"Checks version of EDraw Office Viewer Component control");

 script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an ActiveX control that is affected by a
buffer overflow vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host contains the EDraw Office Viewer Component, an ActiveX
control for working with Microsoft Office documents.

The version of this control installed on the remote host contains a
buffer overflow that can be triggered by a long value for the first
and second arguments of the 'FtpDownloadFile' method.  If an attacker
can trick a user on the affected host into visiting a specially
crafted web page, this method could be used to execute arbitrary code
on the affected system subject to the user's privileges." );
 script_set_attribute(attribute:"see_also", value:"http://www.ocxt.com/archives/48" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to EDraw Office Viewer Component 5.3.288.1 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(119);
 script_set_attribute(attribute:"plugin_publication_date", value: "2008/03/04");
 script_set_attribute(attribute:"vuln_publication_date", value: "2007/10/01");
 script_cvs_date("Date: 2018/08/22 16:49:14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}


include("global_settings.inc");
include("smb_func.inc");
include("smb_activex_func.inc");


if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);


# Locate the file used by the controls.
if (activex_init() != ACX_OK) exit(0);

clsid = "{6BA21C22-53A5-463F-BBE8-5CF7FFA0132B}";
file = activex_get_filename(clsid:clsid);
if (file)
{
  # Check its version.
  ver = activex_get_fileversion(clsid:clsid);
  if (ver && activex_check_fileversion(clsid:clsid, fix:"5.3.288.1") == TRUE)
  {
    report = NULL;

    if (report_paranoia > 1)
      report = string(
        "\n",
        "Version ", ver, " of the vulnerable control is installed as :\n",
        "\n",
        "  ", file, "\n",
        "\n",
        "Note, though, that Nessus did not check whether the kill bit was\n",
        "set for the control's CLSID because of the Report Paranoia setting\n",
        "in effect when this scan was run.\n"
      );
    else if (activex_get_killbit(clsid:clsid) == 0)
      report = string(
        "\n",
        "Version ", ver, " of the vulnerable control is installed as :\n",
        "\n",
        "  ", file, "\n",
        "\n",
        "Moreover, its kill bit is not set so it is accessible via Internet\n",
        "Explorer.\n"
      );
    if (report)
    {
      if (report_verbosity) security_hole(port:kb_smb_transport(), extra:report);
      else security_hole(kb_smb_transport());
    }
  }
}
activex_end();

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.228 Low

EPSS

Percentile

96.6%

Related for OFFICEVIEWER_FTPDOWNLOADFILE_ACTIVEX_OVERFLOW.NASL