Description
BUGTRAQ ID: 25383
eCentrex VOIP Client是一款网络电话客户端软件。
eCentrex VOIP Client的ActiveX控件实现上存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞控制用户系统。
eCentrex SIP UA Com模块(euacom.dll)在处理传送给eCentrex VOIP Client组件ActiveX控件(uacomx.ocx)的ReInit()方式的超长参数时存在栈溢出漏洞,如果用户受骗访问了恶意网页,就可能触发这个溢出,导致执行任意指令。
eCentrex VOIP Client ActiveX 2.0.1
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
<a href="http://www.e800phone.com/abtus.htm" target="_blank">http://www.e800phone.com/abtus.htm</a>
{"href": "https://www.seebug.org/vuldb/ssvid-2162", "status": "poc,details", "bulletinFamily": "exploit", "modified": "2007-08-24T00:00:00", "title": "eCentrex VOIP Client UACOMX.OCX ActiveX\u63a7\u4ef6\u6808\u6ea2\u51fa\u6f0f\u6d1e", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-2162", "cvelist": [], "description": "BUGTRAQ ID: 25383\r\n\r\neCentrex VOIP Client\u662f\u4e00\u6b3e\u7f51\u7edc\u7535\u8bdd\u5ba2\u6237\u7aef\u8f6f\u4ef6\u3002\r\n\r\neCentrex VOIP Client\u7684ActiveX\u63a7\u4ef6\u5b9e\u73b0\u4e0a\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u80fd\u5229\u7528\u6b64\u6f0f\u6d1e\u63a7\u5236\u7528\u6237\u7cfb\u7edf\u3002\r\n\r\neCentrex SIP UA Com\u6a21\u5757\uff08euacom.dll\uff09\u5728\u5904\u7406\u4f20\u9001\u7ed9eCentrex VOIP Client\u7ec4\u4ef6ActiveX\u63a7\u4ef6\uff08uacomx.ocx\uff09\u7684ReInit()\u65b9\u5f0f\u7684\u8d85\u957f\u53c2\u6570\u65f6\u5b58\u5728\u6808\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u5982\u679c\u7528\u6237\u53d7\u9a97\u8bbf\u95ee\u4e86\u6076\u610f\u7f51\u9875\uff0c\u5c31\u53ef\u80fd\u89e6\u53d1\u8fd9\u4e2a\u6ea2\u51fa\uff0c\u5bfc\u81f4\u6267\u884c\u4efb\u610f\u6307\u4ee4\u3002\n\neCentrex VOIP Client ActiveX 2.0.1\n \u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=\"http://www.e800phone.com/abtus.htm\" target=\"_blank\">http://www.e800phone.com/abtus.htm</a>", "viewCount": 3, "published": "2007-08-24T00:00:00", "sourceData": "\n \u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n<html>\r\n<object classid='clsid:BD80D375-5439-4D80-B128-DDA5FDC3AE6C' id='IUAComFormX' /></object>\r\n<script language='vbscript'>\r\n'metasploit one, 456 \n ", "id": "SSV:2162", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T21:58:39", "reporter": "Root", "enchantments": {"score": {"value": 0.3, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.3}, "references": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647695452, "score": 1659785532, "epss": 1678851499}}
{}