Lucene search

K

NuMedia Soft DVD Burning SDK Activex Control RCE Vulnerability

🗓️ 26 Sep 2008 00:00:00Reported by Copyright (C) 2008 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 15 Views

NuMedia Soft DVD Burning SDK Activex Control RCE Vulnerabilit

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Prion
Remote code execution
30 Sep 200817:22
prion
NVD
CVE-2008-4342
30 Sep 200817:22
nvd
CVE
CVE-2008-4342
30 Sep 200817:22
cve
Kaspersky
KLA10097 WLF vulnerability in CDBurnerXP
30 Sep 200800:00
kaspersky
OpenVAS
NuMedia Soft DVD Burning SDK Activex Control Remote Code Execution Vulnerability
26 Sep 200800:00
openvas
OpenVAS
Detection of Dangerous ActiveX Control
4 Feb 200900:00
openvas
OpenVAS
Detection of Dangerous ActiveX Control
4 Feb 200900:00
openvas
Cvelist
CVE-2008-4342
30 Sep 200817:00
cvelist
# SPDX-FileCopyrightText: 2008 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.900132");
  script_version("2025-04-16T05:39:43+0000");
  script_tag(name:"last_modification", value:"2025-04-16 05:39:43 +0000 (Wed, 16 Apr 2025)");
  script_tag(name:"creation_date", value:"2008-09-26 07:36:49 +0200 (Fri, 26 Sep 2008)");
  script_cve_id("CVE-2008-4342");
  script_copyright("Copyright (C) 2008 Greenbone AG");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"registry");
  script_family("General");
  script_name("NuMedia Soft DVD Burning SDK Activex Control RCE Vulnerability");
  script_dependencies("smb_reg_service_pack.nasl");
  script_mandatory_keys("SMB/WindowsVersion");
  script_require_ports(139, 445);

  script_xref(name:"URL", value:"http://cdburnerxp.se/en/home");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/31374");
  script_xref(name:"URL", value:"http://www.milw0rm.com/exploits/6491");

  script_tag(name:"summary", value:"CDBurnerXP is prone to an ActiveX control based remote code
  execution (RCE) vulnerability.");

  script_tag(name:"insight", value:"The flaw is due to an error in validating/sanitizing the input data
  sent to NMSDVDX.dll file.");

  script_tag(name:"affected", value:"CDBurnerXP versions 4.2.1.976 and prior on all platform");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"solution", value:"Upgrade to CDBurnerXP Version 4.3.2 or later.");

  script_tag(name:"impact", value:"Exploitation will cause Internet Explorer to restrict the webpage
  from running scripts and could overwrite files with arbitrary content.");

  exit(0);
}

include("smb_nt.inc");
include("secpod_smb_func.inc");

if(!get_kb_item("SMB/WindowsVersion")){
  exit(0);
}

cdBurnerXpPath = registry_get_sz(item:"ImagePath",
                                 key:"SYSTEM\ControlSet001\Services\NMSAccessU");
if(!cdBurnerXpPath){
  exit(0);
}

cdBurnerXpPath = cdBurnerXpPath - "\NMSAccessU.exe" + "\cdbxpp.exe";
share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:cdBurnerXpPath);
file = ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1", string:cdBurnerXpPath);

name   =  kb_smb_name();
login  =  kb_smb_login();
pass   =  kb_smb_password();
domain =  kb_smb_domain();
port   =  kb_smb_transport();

soc = open_sock_tcp(port);
if(!soc){
  exit(0);
}

if( ! get_kb_item( "login/SMB/kerberos/success" ) ) {
  info = smb_login_and_get_tid_uid(soc:soc, name:name, login:login, passwd:pass, domain:domain, share:share);
} else {
  kdc = kb_smb_kdc();
  host = kb_smb_hostname();
  info = smb_login_and_get_tid_uid(soc:soc, name:name, login:login, passwd:pass, domain:domain, share:share, kdc:kdc, host:host );
}

 if(isnull(info)) {
        close(soc);
        exit(0);
 }

 uid = info["uid"];
 tid = info["tid"];

fid = OpenAndX(socket:soc, uid:uid, tid:tid, file:file);
if(!fid){
  close(soc);
  exit(0);
}

cdBurnerXpVer = GetVersion(socket:soc, uid:uid, tid:tid, fid:fid, verstr:"prod");
close(soc);

if(egrep(pattern:"^([0-3]\..*|4\.([01](\..*)?|2\.(0(\..*)?|1\.([0-8]?[0-9]?" +
         "[0-9]|9[0-6][0-9]|97[0-6]))))$", string:cdBurnerXpVer)){
  security_message( port: 0, data: "The target host was found to be vulnerable" );
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 Sep 2008 00:00Current
6.7Medium risk
Vulners AI Score6.7
CVSS29.3
EPSS0.26707
15
.json
Report