Lucene search

K
nessusThis script is Copyright (C) 2008-2022 Tenable Network Security, Inc.YAHOO_JUKEBOX_ACTIVEX_OVERFLOWS.NASL
HistoryFeb 07, 2008 - 12:00 a.m.

Yahoo! Music Jukebox ActiveX Controls Buffer Overflows

2008-02-0700:00:00
This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.
www.tenable.com
18

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.204 Low

EPSS

Percentile

96.4%

The remote host contains the โ€˜DataGridโ€™ and/or โ€˜MediaGridโ€™ ActiveX controls included with Yahoo! Music Jukebox.

These controls are reportedly affected by multiple buffer overflows involving, for example, the โ€˜AddButtonโ€™ and โ€˜AddImageโ€™ methods of the โ€˜DataGridโ€™ control and โ€˜AddBitmapโ€™ method of the โ€˜MediaGridโ€™ control.
If an attacker can trick a user on the affected host into visiting a specially crafted web page, these issues could be leveraged to execute arbitrary code on the host subject to the userโ€™s privileges.

#%NASL_MIN_LEVEL 70300
#
#  (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(30205);
  script_version("1.19");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2008-0623", "CVE-2008-0624", "CVE-2008-0625");
  script_bugtraq_id(27578, 27579, 27590);
  script_xref(name:"CERT", value:"101676");
  script_xref(name:"CERT", value:"340860");
  script_xref(name:"EDB-ID", value:"5043");
  script_xref(name:"EDB-ID", value:"5046");
  script_xref(name:"EDB-ID", value:"5048");
  script_xref(name:"EDB-ID", value:"5051");
  script_xref(name:"EDB-ID", value:"5052");

  script_name(english:"Yahoo! Music Jukebox ActiveX Controls Buffer Overflows");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has a least one ActiveX control that is
affected by buffer overflow vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote host contains the 'DataGrid' and/or 'MediaGrid' ActiveX
controls included with Yahoo! Music Jukebox.

These controls are reportedly affected by multiple buffer overflows
involving, for example, the 'AddButton' and 'AddImage' methods of the
'DataGrid' control and 'AddBitmap' method of the 'MediaGrid' control.
If an attacker can trick a user on the affected host into visiting a
specially crafted web page, these issues could be leveraged to execute
arbitrary code on the host subject to the user's privileges.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Feb/24");
  script_set_attribute(attribute:"solution", value:
"Upgrade to version 2.2.2.058 of the control as described in the vendor
advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_cwe_id(119);

  script_set_attribute(attribute:"plugin_publication_date", value:"2008/02/07");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}


include("global_settings.inc");
include("smb_func.inc");
include("smb_activex_func.inc");


if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);


# Locate files used by the controls.
if (activex_init() != ACX_OK) exit(0);

info = "";
clsids = make_list(
  "{22FD7C0A-850C-4A53-9821-0B0915C96139}",
  "{5F810AFC-BB5F-4416-BE63-E01DD117BD6C}"
);
foreach clsid (clsids)
{
  file = activex_get_filename(clsid:clsid);
  if (file)
  {
    ver = activex_get_fileversion(clsid:clsid);
    if (ver && activex_check_fileversion(clsid:clsid, fix:"2.2.2.058") == TRUE)
    {
      info += '  ' + file + ' (' + ver + ')\n';
      if (!thorough_tests) break;
    }
  }
}
activex_end();


if (info)
{
  if (report_verbosity)
  {
   report = string(
     "\n",
     "Nessus found the following affected control(s) installed :\n",
     "\n",
     info
   );
   security_hole(port:kb_smb_transport(), extra:report);
  }
  else security_hole(kb_smb_transport());
}

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.204 Low

EPSS

Percentile

96.4%

Related for YAHOO_JUKEBOX_ACTIVEX_OVERFLOWS.NASL