Hardcore Disassembler / Reverse Engineer
Reversing must be a passion as your skills will be challenged on a daily basis and you will be working several hours everyday in IDA, Ollydbg, and with BinDiff. Often, it is also required that you write a PoC or even a working exploit to prove that an issue is exploitable.
TITLE: eBay Enhanced Picture Services ActiveX Control Buffer Overflow
SECUNIA ADVISORY ID: SA20969
VERIFY ADVISORY: http://secunia.com/advisories/20969/
CRITICAL: Highly critical
IMPACT: System access
WHERE: >From remote
SOFTWARE: eBay Enhanced Picture Services ActiveX Control 1.x http://secunia.com/product/10967/
DESCRIPTION: Will Dormann has reported a vulnerability in eBay Enhanced Picture Services ActiveX Control, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an unspecified boundary error in EUPWALcontrol.dll and can be exploited to cause a buffer overflow by e.g. tricking a user into visiting a malicious web site.
Successful exploitation allows execution of arbitrary code.
The vulnerability has been reported in version 126.96.36.199. Other versions may also be affected.
SOLUTION: Update to version 188.8.131.52 or later.
PROVIDED AND/OR DISCOVERED BY: Will Dormann
ORIGINAL ADVISORY: US-CERT VU#597721: http://www.kb.cert.org/vuls/id/597721
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.