Microsoft Agent URL Handling Remote Code Execution

2007-09-11T14:17:13
ID OSVDB:36934
Type osvdb
Reporter Assurent Secure Technologies(), Yamata Li(), iDefense Labs()
Modified 2007-09-11T14:17:13

Description

Vulnerability Description

A remote overflow exists in Microsoft Windows 2000 Agent ActiveX control. The ActiveX control fails to sanitize URLs passed as argument to a certain unspecified method, resulting in a stack-based buffer overflow. With a specially crafted request, an attacker can cause execution of arbitrary code resulting in a loss of confidentiality, integrity, and/or availability.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

Short Description

A remote overflow exists in Microsoft Windows 2000 Agent ActiveX control. The ActiveX control fails to sanitize URLs passed as argument to a certain unspecified method, resulting in a stack-based buffer overflow. With a specially crafted request, an attacker can cause execution of arbitrary code resulting in a loss of confidentiality, integrity, and/or availability.

References:

Secunia Advisory ID:26753 Other Advisory URL: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=592 Other Advisory URL: http://securityreason.com/securityalert/3124 OVAL ID: 2116 Microsoft Security Bulletin: MS07-051 Microsoft Knowledge Base Article: 938827 Mail List Post: http://www.securityfocus.com/archive/1/archive/1/479096/100/0/threaded ISS X-Force ID: 35752 FrSIRT Advisory: ADV-2007-3113 CVE-2007-3040 CERT VU: 716872